International Journal of Electronic Security and Digital Forensics

IJESDF aims to establish dialogue in an ideal and unique setting for researchers and practitioners to have a knowledge resource, report and publish scholarly articles and engage in debate on various security-related issues, new developments and latest proven methodologies in the field of electronic security and digital forensics. This includes the measures governments must take to protect the security of information on the Internet, the implications of cyber-crime in large corporations and for individuals, vulnerability research, zero day attacks, digital forensic investigation, ethical hacking, anti-forensics, identity fraud, phishing, pharming, relevant case studies, and "best practice" for tackling cyber crime.

Publisher
Inderscience Enterprises Ltd.
Some content from Wikipedia, licensed under CC BY-SA

Spotting the elephant not in the room

An automated thermal detection system that can discern wild elephants from background and other animals in infrared images could save lives in parts of the world where the animals roam free and often enter villages and other ...

dateJul 10, 2015 in Ecology
shares16 comments 0

Defeating credit card fraud

Online behavioural targeting and device fingerprinting could be used to combat credit card fraud according to a team from Botswana International University of Science and Technology, in Palapye, Botswana. Writing in the International ...

dateJan 08, 2019 in Security
shares6 comments 0

How private is your browser's privacy mode?

A forensic analysis of the so-called "private" browsing modes of the most popular web browsers, Microsoft's Internet Explorer, Google Chrome, Mozilla Firefox, and Opera, reveals that the Microsoft product tested in this research ...

dateFeb 18, 2016 in Security
shares24 comments 1

Is fog more secure than cloud?

Computer scientists in Italy are working on a new concept for remote and distributed storage of documents that could have all the benefits of cloud computing but without the security issues of putting one's sensitive documents ...

dateMar 17, 2017 in Security
shares22 comments 2

Closing a malware security loophole

An add-on for antivirus software that can scan across a computer network and trap malicious activity missed by the system firewall is being developed by an international team. Details are reported in the International Journal ...

dateDec 07, 2015 in Security
shares11 comments 0

Fuzzy logic helps detect redirection spam

Web browsers might soon use fuzzy logic to spot redirection spam and save users from being scammed, phished or opening malicious sites unwittingly, according to researchers in India writing in the International Journal of ...

dateJun 16, 2016 in Security
shares7 comments 0

Malware bites

Antivirus software running on your computer has one big weak point - if a new virus is released before the antivirus provider knows about it or before the next scheduled antivirus software update, your system can be infected. ...

dateAug 15, 2013 in Security
shares0 comments 17

The inverse CSI effect in the age of digital crime

The "CSI Effect" has been described as being an increased expectation from jurors that forensic evidence will be presented in court that is instantaneous and unequivocal because that is how it is often presented for dramatic ...

dateJul 10, 2013 in Internet
shares0 comments 0