研飞客户端支持数万种期刊查询,助你在阅读和写作中随时了解期刊动态

International Journal of Electronic Security and Digital Forensics

短名IJESDF
Journal Impact0.25
国际分区COMPUTER SCIENCE, INFORMATION SYSTEMS(Q4)
ISSN1751-911X, 1751-9128
h-index17

《International Journal of Electronic Security and Digital Forensics》旨在为研究人员和从业者提供一个理想而独特的交流平台,成为知识资源的汇聚地,报告和发表学术文章,并就各种安全相关问题、新发展和最新有效方法进行辩论。内容涵盖政府在保护互联网信息安全方面必须采取的措施、网络犯罪对大型企业和个人的影响、漏洞研究、零日攻击、数字取证调查、道德黑客、反取证、身份欺诈、网络钓鱼、域名劫持,以及相关案例研究和应对网络犯罪的“最佳实践”。

阅读文献时,研飞即可帮你快速了解期刊,查询影响因子与分区,智能高亮期刊预警!

涉及主题计算机科学计算机安全操作系统数学政治学法学人工智能计算机网络工程类程序设计语言万维网生物算法计算机视觉地理考古历史物理加密数据科学互联网
出版信息出版商: Inderscience Enterprises Ltd出版周期: 期刊类型: journal
基本数据创刊年份: 2012原创研究文献占比97.22%自引率:25.00%Gold OA占比: 0.00%

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

手工熬夜修改参考文献?研飞自动匹配期刊,一键轻松成稿,支持 Word/WPS

点击下方按钮,免费开启试用!

最新文章

Deep learning-based anomaly detection in video surveillance

2025-1-1

A Novel IoT-enabled Portable, Secure Automatic Self-Lecture Attendance Systems (SLAS): Design, Development, and Comparison

2025-1-1

A Secure SEO Techniques for Improving the Website Ranking: An Efficient Approach

2025-1-1

A supervised machine learning based framework for deanonymisation of blockchain transactions

2025-1-1

Honeybrid method for the Network Security in Software Defined Network System

2025-1-1

Criminal Protection to the Digital Right to be forgotten in Jordan

2025-1-1

Dispute rules applicable to electronic commerce contracts

2025-1-1

Artificial intelligence and security: some reflections concerning the freedom of expression, information and democracy

2025-1-1

A novel scalable and cost efficient blockchain solution for managing lifetime vaccination records based on patient preference

2025-1-1

Machine learning in IoT digital forensics: a state-of-the-art review

2025-1-1

Secure System to Secure Crime data using Hybrid RSA-AES and Hybrid Blowfish-Triple DES

2025-1-1

A FUTURE PREDICTION FOR CYBER ATTACK IN NETWORK DOMAIN WITH VISUALIZING PATTERNS IN CYBER-SECURITY TICKETS WITH MACHINE LEARNING

2025-1-1

Enhancing network security: a deep learning-based method to detect and diminish attacks

2025-1-1

The Authenticity of Digital Evidence in Criminal Courts: A Comparative Study

2025-1-1

Feature-driven Anomalous Behaviour Detection and Incident Classification Model for ICS in Water Treatment Plants

2025-1-1

Exploring Advanced Steganography Techniques for Secure Digital Image Communication: A Comparative Analysis and Performance Evaluation

2025-1-1

Android Malware Analysis using Multiple Machine Learning Algorithms

2025-1-1

Implementation of a novel technique for ordering of features algorithm in Detection of Ransomware Attack

2025-1-1

Comprehensive Review of Emerging Cyber security Trends and Developments

2025-1-1

Pixel recurrence based image watermarking for block based integrity verification

2025-1-1

Blockchain as an indispensable asset for educational institutions: A systematic review

2025-1-1

Methods of Teaching Electronic Administration Legislation by Using Artificial Intelligence Techniques

2025-1-1

A Proposed model for Security of Quality of Experience (QoE) Data in Cloud Gaming Environment

2025-1-1

A DWT-DCT-SVD Based Robust Watermark Method for Image Copyright Protection

2025-1-1

A Hybrid Approach for Social Media Forensics

2025-1-1

The Future of Third Web: A Role of Blockchain and Web 3.0

2025-1-1

A novel method to increase the security in 5G networks using Deep Learning

2025-1-1

Legal Regulation of Payment Using Virtual Currency: Comparative Study

2025-1-1

ANALYSIS OF CYBER DELINQUENCY AMONG ‘GENERATION Z’ IN INDIA

2025-1-1

SECURE SENSING AND COMPUTING TECHNIQUES BASED ON FUZZY IN 5G

2025-1-1

VLMDALP: Design of an efficient VARMA LSTM based Model for identification of DDoS attacks using Application-Level Packet analysis

2025-1-1

DarkExtract: Tool for Extracting and Analyzing Tor browser host-based Activities

2025-1-1

Advanced forensic analysis of Tails Operating Systems and its implication to cybercrime in Deep and Dark web

2025-1-1

Forensic Investigation and Analysis of Malware in Windows OS

2025-1-1

A Forensic Approach: Identification of Source Printer through Deep Learning

2025-1-1

Network Security Attack Classification: Leveraging Machine Learning Methods for Enhanced Detection and Defense.

2025-1-1

A model for detecting cyber security intrusions using machine learning techniques

2025-1-1

IoT security using deep learning algorithm: intrusion detection model using LSTM

2025-1-1

A proposed framework for the detection of cyber threats using open-source intelligence tools in real-time

2025-1-1

Image encryption and decryption using graph theory

2025-1-1

Adversarial attacks on machine learning-based cyber security systems: a survey of techniques and defences

2025-1-1

On classifying memory contents at page-level granularity: machine-learning approach

2025-1-1

An intelligent method for detection and classification of Darknet traffic using sequential model along with Adam and stochastic gradient decent optimisers

2025-1-1

Exploring novel encryption approaches for safeguarding heterogeneous data

2025-1-1

Machine learning-based cyber attack recognition model

2025-1-1

Exploring machine learning techniques for detecting anomalies in digital forensics: a survey

2025-1-1

AI chatbots: security and privacy challenges

2025-1-1

Data security by means of cryptography and image processing - a deep learning based method

2025-1-1

Matrix-based homomorphic encryption-using random prime numbers

2025-1-1

Enhancement of data security in wireless sensors network: application in internet of things

2025-1-1

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司