International Journal of Electronic Security and Digital Forensics

IJESDF aims to establish dialogue in an ideal and unique setting for researchers and practitioners to have a knowledge resource, report and publish scholarly articles and engage in debate on various security-related issues, new developments and latest proven methodologies in the field of electronic security and digital forensics. This includes the measures governments must take to protect the security of information on the Internet, the implications of cyber-crime in large corporations and for individuals, vulnerability research, zero day attacks, digital forensic investigation, ethical hacking, anti-forensics, identity fraud, phishing, pharming, relevant case studies, and "best practice" for tackling cyber crime.

Inderscience Enterprises Ltd.
Some content from Wikipedia, licensed under CC BY-SA

Spotting the elephant not in the room

An automated thermal detection system that can discern wild elephants from background and other animals in infrared images could save lives in parts of the world where the animals roam free and often enter villages and other ...

dateJul 10, 2015 in Ecology
shares16 comments 0

Malware bites

Antivirus software running on your computer has one big weak point - if a new virus is released before the antivirus provider knows about it or before the next scheduled antivirus software update, your system can be infected. ...

dateAug 15, 2013 in Security
shares0 comments 17

The inverse CSI effect in the age of digital crime

The "CSI Effect" has been described as being an increased expectation from jurors that forensic evidence will be presented in court that is instantaneous and unequivocal because that is how it is often presented for dramatic ...

dateJul 10, 2013 in Internet
shares0 comments 0

Computer memory leaks a turn off

When you switch off your computer any passwords you used to login to web pages, your bank or other financial account evaporate into the digital ether, right? Not so fast! Researchers in Greece have discovered a security loophole ...

dateAug 11, 2012 in Computer Sciences
shares0 comments 2