Sample articles
You can read all of these full-text articles free of charge - click

International Journal of Electronic Security and Digital Forensics
Title | Author(s) | Vol. and Issue nos. | Page nos. | Full-text article |
Security in database management system using machine learning | M. Deepa; J. Dhilipan | Vol.16 No.1 | 124-133 | ![]() |
Data hiding using video steganography | C. Ravichandran; Ashok Vajravelu; Sankarsan Panda; Sheshang Dipakkumar Degadwala | Vol.16 No.1 | 112-123 | ![]() |
Image encryption based on 3D Arnold and elementary cellular automata method | Rui Yang; Lijuan Feng; Jiangjiang Li | Vol.16 No.1 | 97-111 | ![]() |
Analysis of smart grid-based intrusion detection system through machine learning methods | D. Ravikumar; K. Sasikala; R.S. Vijayashanthi; S. Narasimha Prasad | Vol.16 No.1 | 84-96 | ![]() |
An original data encryption technique for communication networks | A. Rajasekar; A. Karunakaran; C. Sivakumaran; Sheshang Dipakkumar Degadwala | Vol.16 No.1 | 73-83 | ![]() |
Formulation of a two-level electronic security and protection system for malls | T. Thirumurugan; Leena Bojaraj; R. Lavanya; T.J. Nagalakshmi | Vol.16 No.1 | 63-72 | ![]() |
Internet of things-based virtual private social networks on a text messaging strategy on mobile platforms | Alagappan Annamalai; Ramesh Chandra Poonia; Suresh Shanmugasundaram | Vol.16 No.1 | 40-62 | ![]() |
Security of internet of things based on cryptographic algorithm | Sonam Mittal; Soni Singh; D. Balakumaran; K. Hemalatha | Vol.16 No.1 | 28-39 | ![]() |
Legal mechanism for regulating responsibilities in the information sphere | Aigerim Issakhankyzy; Gulnar A. Alibayeva; Ainur A. Sabitova; Serik K. Zhetpisov; Botakoz S. Shansharbayeva | Vol.16 No.1 | 14-27 | ![]() |
Essence, concept, and types of national legislation in the field of information technology | Sergey Manin; Salahiden Sabikenov; Yelena Manina | Vol.16 No.1 | 1-13 | ![]() |