


default search action
ISDFS 2020: Beirut, Lebanon
- 8th International Symposium on Digital Forensics and Security, ISDFS 2020, Beirut, Lebanon, June 1-2, 2020. IEEE 2020, ISBN 978-1-7281-6939-2

- Mazoon AlRoubiei, Thuraiya AlYarubi, Basant Kumar

:
Critical Analysis of Cryptographic Algorithms. 1-7 - Hussein Faroq Tayeb, Murat Karabatak, Cihan Varol

:
Time Series Database Preprocessing for Data Mining Using Python. 1-4 - Christine Orosco, Cihan Varol

, Narasimha K. Shashidhar:
Graphically Display Database Transactions to Enhance Database Forensics. 1-6 - Müslim Alanoglu

, Songül Karabatak:
Students' Usage of Smartphones during the Lectures. 1-4 - Marie-Rose Boueiz:

Importance of rooting in an Android data acquisition. 1-4 - Abdalbasit Mohammed Qadir, Asaf Varol

:
The Role of Machine Learning in Digital Forensics. 1-5 - Nevzat Olgun

, Ibrahim Türkoglu
:
Classification of Live/Lifeless Assets with Laser Beams in Different Humidity Environments. 1-6 - Innocent Agbo, Alexander V. Kupriyanov

, Igor Rytsarev:
Big Data Architecture: Designing the Right Solution for Social Network Analysis. 1-5 - Anna Egorova, Victor Fedoseev

:
QIM-Based Semi-Fragile Watermarking for H.264 Video Authentication. 1-6 - Safa Aktepe, Cihan Varol

, Narasimha K. Shashidhar:
MiNo: The Chrome Web Browser Add-on Application to Block the Hidden Cryptocurrency Mining Activities. 1-5 - Peshraw Ahmed Abdalla

, Cihan Varol
:
Testing IoT Security: The Case Study of an IP Camera. 1-5 - Mikhail Gashnikov

:
Decision-Tree-Based Interpolation for Multidimensional Signal Compression. 1-5 - Deepa Muraleedharan, Sanil. K. Daniel:

An efficient IP core of Consultative Committee for Space Data Systems (CCSDS) Recommended Authenticated Cryptographic Algorithm. 1-6 - Hussein Majed, Hassan N. Noura

, Ali Chehab
:
Overview of Digital Forensics and Anti-Forensics Techniques. 1-5 - Andrey Kuznetsov

, Mikhail Gashnikov
:
Remote Sensing Image Inpainting with Generative Adversarial Networks. 1-6 - Andrew Johnson, Richard Ward:

Introducing The 'Unified Side Channel Attack - Model' (USCA-M). 1-9 - Pawan Sh. Othman, Ridwan B. Marqas

, Diler N. Abdulqader, Saman M. Almufti
:
Effect of Mean Filter on Face Image from Video Frames. 1-7 - Yasser Fadlallah, Mohamad Sbeiti, Mohamad Hammoud, Mohamad Nehme, Ahmad Fadlallah:

On the Cyber Security of Lebanon: A Large Scale Empirical Study of Critical Vulnerabilities. 1-6 - Mohammed Hussein Abdalla

, Murat Karabatak:
To Review and Compare Evolutionary Algorithms in Optimization of Distributed Database Query. 1-5 - Muhammad Raheel Raza

, Asaf Varol
:
QoS Parameters for Viable SLA in Cloud. 1-5 - Yuliya D. Vybornova

:
Method for Image Copyright Protection Based on Construction of Highly Robust Watermarks. 1-4 - Luis Francisco Plá, Narasimha K. Shashidhar, Cihan Varol

:
On-Premises Versus SECaaS Security Models. 1-6 - Habib Ibrahim, Asaf Varol

:
A Study on Automatic Speech Recognition Systems. 1-5 - Bashir Zak Adamu, Murat Karabatak, Fatih Ertam

:
A Conceptual Framework for Database Anti-forensics Impact Mitigation. 1-6 - Kok Seen Chong, Chern Nam Yap, Zheng Hong Tew:

Multi-Key Homomorphic Encryption Create new Multiple Logic Gates and Arithmetic Circuit. 1-4 - Samiha S. Shimmi, Gokila Dorai

, Umit Karabiyik, Sudhir Aggarwal:
Analysis of iOS SQLite Schema Evolution for Updating Forensic Data Extraction Tools. 1-7 - Abdulazeez Mousa, Murat Karabatak, Twana Mustafa:

Database Security Threats and Challenges. 1-5 - Abdelhalim Badr, Aliaa Youssif, Maged Wafi

:
A Robust Copy-Move Forgery Detection In Digital Image Forensics Using SURF. 1-6 - Ersin Enes Eryilmaz

, Durmus Özkan Sahin, Erdal Kiliç
:
Filtering Turkish Spam Using LSTM From Deep Learning Techniques. 1-6 - Hassan N. Noura

, Ali Chehab
, Raphaël Couturier:
Overview of Efficient Symmetric Cryptography: Dynamic vs Static Approaches. 1-6 - Samar M. Alkhuraiji

:
Cinema Station Application (CSA): An augmented reality application for accessing film information and online cinema booking. 1-6 - Abdalbasit Mohammed Qadir, Peter Cooper:

GPS-based Mobile Cross-platform Cargo Tracking System with Web-based Application. 1-7 - Mohammad Meraj Mirza

, Fahad E. Salamh
, Umit Karabiyik:
An Android Case Study on Technical Anti-Forensic Challenges of WhatsApp Application. 1-6 - Awf Abdulrahman

, Serkan Varol:
A Review of Image Segmentation Using MATLAB Environment. 1-5 - Twana Mustafa, Asaf Varol

:
Review of the Internet of Things for Healthcare Monitoring. 1-6 - Songül Karabatak, Murat Karabatak:

Z Generation Students and Their Digital Footprints. 1-5 - Thamali Madhushani Adhikari, Yan Wu:

Classifying Software Vulnerabilities by Using the Bugs Framework. 1-6 - Iliyasu Yahaya Adam, Cihan Varol

:
Intelligence in Digital Forensics Process. 1-6 - Zina Balani

, Hacer Varol:
Cloud Computing Security Challenges and Threats. 1-4 - Hasan k. Idriss:

Mirai Botnet In Lebanon. 1-6 - Salim Jibrin Danbatta

, Asaf Varol
:
Predicting Student's Final Graduation CGPA Using Data Mining and Regression Methods: A Case Study of Kano Informatics Institute. 1-7 - Chawan Taha Hama Ali, Asaf Varol

:
Design and Implementation of a Simple Online Court Case Management System Based on the Android Platform. 1-4 - Songül Karabatak, Müslim Alanoglu

, Murat Karabatak:
Effects of Homework Supported Distance Education on Academic Satisfaction, Academic Achievement, and Attitude towards Distance Education. 1-5 - Yesim Ülgen Sönmez

, Asaf Varol
:
In-Depth Analysis of Speech Production, Auditory System, Emotion Theories and Emotion Recognition. 1-8 - Habib Ibrahim, Songül Karabatak, Abdullahi Abba Abdullahi:

A Study on Cybersecurity Challenges in E-learning and Database Management System. 1-5 - Murat Karabatak, Twana Mustafa, Chawan Hamaali:

Remote Monitoring Real Time Air pollution - IoT (Cloud Based). 1-6 - Shaheryar Ehsan I Haque, Shahzad Saleem

:
Augmented reality based criminal investigation system (ARCRIME). 1-6 - Aina'u Shehu Muhammed, Derya Ucuz:

Comparison of the IoT Platform Vendors, Microsoft Azure, Amazon Web Services, and Google Cloud, from Users' Perspectives. 1-4 - Derrick Berger, Narasimha K. Shashidhar, Cihan Varol

:
Using ITIL 4 in Security Management. 1-6 - Sundar Krishnan, Bing Zhou:

Predicting Crime Scene Location Details for First Responders. 1-7 - Muhammad Raheel Raza

, Asaf Varol
, Nurhayat Varol:
Cloud and Fog Computing: A Survey to the Concept and Challenges. 1-6 - Shalaw Mshir, Mehmet Kaya:

Signature Recognition Using Machine Learning. 1-4 - Reem A. Nabha, Hassan Sbeyti:

Exploiting Vulnerabilities Of MRI Scanner Machine: Lebanon Case Study. 1-7 - Steven Zavala, Narasimha K. Shashidhar, Cihan Varol

:
Cybersecurity Evaluation with PowerShell. 1-6 - Lazaro A. Herrera:

Challenges of acquiring mobile devices while minimizing the loss of usable forensics data. 1-5 - Neil Andes, Mingkui Wei:

District Ransomware: Static and Dynamic Analysis. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.




Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID



















