


default search action
International Journal of Digital Crime and Forensics, Volume 12
Volume 12, Number 1, 2020
- Áine MacDermott

, Thar Baker
, Paul Buck, Farkhund Iqbal
, Qi Shi
:
The Internet of Things: Challenges and Considerations for Cybercrime Investigations and Digital Forensics. 1-13 - Chee Cheun Huang, Chien Eao Lee, Vrizlynn L. L. Thing:

A Novel Video Forgery Detection Model Based on Triangular Polarity Feature Classification. 14-34 - Hana Bouafif, Faouzi Kamoun

, Farkhund Iqbal
:
Towards a Better Understanding of Drone Forensics: A Case Study of Parrot AR Drone 2.0. 35-57 - Ahmed Almutairi, Behzad Shoarian Satari, Carlos Rivas, Cristian Florin Stanciu, Mozhdeh Yamani, Zahra Zohoorsaadat, Serguei A. Mokhov

:
Evaluation of Autopsy and Volatility for Cybercrime Investigation: A Forensic Lucid Case Study. 58-89 - Mahmoud Kalash, Mrigank Rochan, Noman Mohammed, Neil D. B. Bruce, Yang Wang, Farkhund Iqbal

:
A Deep Learning Framework for Malware Classification. 90-108 - Chao Wu, Yuan'an Liu, Fan Wu, Feng Liu, Hui Lu, Wenhao Fan, Bihua Tang:

A Hybrid Intrusion Detection System for IoT Applications with Constrained Resources. 109-130 - Yufei Wang, Yongjian Hu, Alan Wee-Chung Liew

, Chang-Tsun Li:
ENF Based Video Forgery Detection Algorithm. 131-156 - Dan Huang, Fangjun Huang:

Reversible Data Hiding Based on Adaptive Block Selection Strategy. 157-168
Volume 12, Number 2, 2020
- Jinsheng Xiao, Wenxin Xiong, Yuan Yao, Liang Li, Reinhard Klette

:
Lane Detection Algorithm Based on Road Structure and Extended Kalman Filter. 1-20 - Xinguo Yu, Wu Song, Xiaopan Lyu

, Bin He
, Nan Ye:
Reading Both Single and Multiple Digital Video Clocks Using Context-Aware Pixel Periodicity and Deep Learning. 21-39 - Raouia Mokni

, Hassen Drira
, Monji Kherallah
:
Deep-Analysis of Palmprint Representation Based on Correlation Concept for Human Biometrics Identification. 40-58 - Wenjun Huang, Chao Liang

, Chunxia Xiao, Zhen Han:
Video-Based Person Re-Identification With Unregulated Sequences. 59-76
Volume 12, Number 3, 2020
- Jingyuan Rao, Min Tu, Xuanjin Yang:

Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks. 1-14 - Yi Zhang:

User Identity Hiding Method of Android. 15-26 - Gulivindala Suresh

, Chanamallu Srinivasarao:
Copy Move Forgery Detection Through Differential Excitation Component-Based Texture Features. 27-44 - Biaoli Tao, Rangding Wang, Diqun Yan

, Chao Jin:
Anti-Forensics of Double Compressed MP3 Audio. 45-57 - Puneet Sharma, Deepak Arora, T. Sakthivel:

Mobile Cloud Forensic Readiness Process Model for Cloud-Based Mobile Applications. 58-76 - Amar B. Deshmukh, N. Usha Rani:

Optimization-Driven Kernel and Deep Convolutional Neural Network for Multi-View Face Video Super Resolution. 77-95 - Xuehu Yan

, Yuliang Lu, Lintao Liu:
A Common General Access Structure Construction Approach in Secret Image Sharing. 96-110 - Jin Du, Liping Ding, Guangxuan Chen:

Research on the Rules of Electronic Evidence in Chinese Criminal Proceedings. 111-121
Volume 12, Number 4, 2020
- Prathap Rudra Boppuru

, Ramesha Kenchappa
:
Spatio-Temporal Crime Analysis Using KDE and ARIMA Models in the Indian Context. 1-19 - Yang Zhao, Yaqin Fan, Mingrui Yin, Cheng Fang:

Research on the Construction of a Student Model of an Adaptive Learning System Based on Cognitive Diagnosis Theory. 20-31 - Xin Liu, RuiHua Qi, Lin Shao:

Joint Model-Based Attention for Spoken Language Understanding Task. 32-43 - Xi Chen, Fangming Ruan, Lvyang Zhang, Yang Zhao:

Design of Cyberspace Security Talents Training System Based on Knowledge Graph. 44-53 - Lili Du, Yaqin Fan, Lvyang Zhang, Lianying Wang, Tianhang Sun:

A Summary of the Development of Cyber Security Threat Intelligence Sharing. 54-67 - Xin Zheng, Jun Li, Qingrong Wu:

A Light Recommendation Algorithm of We-Media Articles Based on Content. 68-81

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














