研飞客户端支持数万种期刊查询,助你在阅读和写作中随时了解期刊动态
International Journal of Electronic Security and Digital Forensics
短名 | IJESDF |
Journal Impact | 0.25 |
国际分区 | COMPUTER SCIENCE, INFORMATION SYSTEMS(Q4) |
ISSN | 1751-911X, 1751-9128 |
h-index | 17 |
《International Journal of Electronic Security and Digital Forensics》旨在为研究人员和从业者提供一个理想而独特的交流平台,成为知识资源的汇聚地,报告和发表学术文章,并就各种安全相关问题、新发展和最新有效方法进行辩论。内容涵盖政府在保护互联网信息安全方面必须采取的措施、网络犯罪对大型企业和个人的影响、漏洞研究、零日攻击、数字取证调查、道德黑客、反取证、身份欺诈、网络钓鱼、域名劫持,以及相关案例研究和应对网络犯罪的“最佳实践”。
阅读文献时,研飞即可帮你快速了解期刊,查询影响因子与分区,智能高亮期刊预警!
涉及主题 | 计算机科学计算机安全操作系统数学政治学法学人工智能计算机网络工程类程序设计语言万维网生物算法计算机视觉地理考古历史物理加密数据科学互联网 |
出版信息 | 出版商: Inderscience Enterprises Ltd,出版周期: ,期刊类型: journal |
基本数据 | 创刊年份: 2012,原创研究文献占比: 97.22%,自引率:25.00%, Gold OA占比: 0.00% |
期刊引文格式
这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。
并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。
只有1位作者的期刊
有2位作者的期刊
有3位作者的期刊
有5位以上作者的期刊
书籍引用格式
以下是创作和编辑的书籍的参考文献的示例。
学位论文引用格式
网页引用格式
这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。
专利引用格式
手工熬夜修改参考文献?研飞自动匹配期刊,一键轻松成稿,支持 Word/WPS
点击下方按钮,免费开启试用!
最新文章
Deep learning-based anomaly detection in video surveillance
2025-1-1
A Novel IoT-enabled Portable, Secure Automatic Self-Lecture Attendance Systems (SLAS): Design, Development, and Comparison
2025-1-1
A Secure SEO Techniques for Improving the Website Ranking: An Efficient Approach
2025-1-1
A supervised machine learning based framework for deanonymisation of blockchain transactions
2025-1-1
Honeybrid method for the Network Security in Software Defined Network System
2025-1-1
Criminal Protection to the Digital Right to be forgotten in Jordan
2025-1-1
Dispute rules applicable to electronic commerce contracts
2025-1-1
Artificial intelligence and security: some reflections concerning the freedom of expression, information and democracy
2025-1-1
A novel scalable and cost efficient blockchain solution for managing lifetime vaccination records based on patient preference
2025-1-1
Machine learning in IoT digital forensics: a state-of-the-art review
2025-1-1
Secure System to Secure Crime data using Hybrid RSA-AES and Hybrid Blowfish-Triple DES
2025-1-1
A FUTURE PREDICTION FOR CYBER ATTACK IN NETWORK DOMAIN WITH VISUALIZING PATTERNS IN CYBER-SECURITY TICKETS WITH MACHINE LEARNING
2025-1-1
Enhancing network security: a deep learning-based method to detect and diminish attacks
2025-1-1
The Authenticity of Digital Evidence in Criminal Courts: A Comparative Study
2025-1-1
Feature-driven Anomalous Behaviour Detection and Incident Classification Model for ICS in Water Treatment Plants
2025-1-1
Exploring Advanced Steganography Techniques for Secure Digital Image Communication: A Comparative Analysis and Performance Evaluation
2025-1-1
Android Malware Analysis using Multiple Machine Learning Algorithms
2025-1-1
Implementation of a novel technique for ordering of features algorithm in Detection of Ransomware Attack
2025-1-1
Comprehensive Review of Emerging Cyber security Trends and Developments
2025-1-1
Pixel recurrence based image watermarking for block based integrity verification
2025-1-1
Blockchain as an indispensable asset for educational institutions: A systematic review
2025-1-1
Methods of Teaching Electronic Administration Legislation by Using Artificial Intelligence Techniques
2025-1-1
A Proposed model for Security of Quality of Experience (QoE) Data in Cloud Gaming Environment
2025-1-1
A DWT-DCT-SVD Based Robust Watermark Method for Image Copyright Protection
2025-1-1
A Hybrid Approach for Social Media Forensics
2025-1-1
The Future of Third Web: A Role of Blockchain and Web 3.0
2025-1-1
A novel method to increase the security in 5G networks using Deep Learning
2025-1-1
Legal Regulation of Payment Using Virtual Currency: Comparative Study
2025-1-1
ANALYSIS OF CYBER DELINQUENCY AMONG GENERATION Z IN INDIA
2025-1-1
SECURE SENSING AND COMPUTING TECHNIQUES BASED ON FUZZY IN 5G
2025-1-1
VLMDALP: Design of an efficient VARMA LSTM based Model for identification of DDoS attacks using Application-Level Packet analysis
2025-1-1
DarkExtract: Tool for Extracting and Analyzing Tor browser host-based Activities
2025-1-1
Advanced forensic analysis of Tails Operating Systems and its implication to cybercrime in Deep and Dark web
2025-1-1
Forensic Investigation and Analysis of Malware in Windows OS
2025-1-1
A Forensic Approach: Identification of Source Printer through Deep Learning
2025-1-1
Network Security Attack Classification: Leveraging Machine Learning Methods for Enhanced Detection and Defense.
2025-1-1
A model for detecting cyber security intrusions using machine learning techniques
2025-1-1
IoT security using deep learning algorithm: intrusion detection model using LSTM
2025-1-1
A proposed framework for the detection of cyber threats using open-source intelligence tools in real-time
2025-1-1
Image encryption and decryption using graph theory
2025-1-1
Adversarial attacks on machine learning-based cyber security systems: a survey of techniques and defences
2025-1-1
On classifying memory contents at page-level granularity: machine-learning approach
2025-1-1
An intelligent method for detection and classification of Darknet traffic using sequential model along with Adam and stochastic gradient decent optimisers
2025-1-1
Exploring novel encryption approaches for safeguarding heterogeneous data
2025-1-1
Machine learning-based cyber attack recognition model
2025-1-1
Exploring machine learning techniques for detecting anomalies in digital forensics: a survey
2025-1-1
AI chatbots: security and privacy challenges
2025-1-1
Data security by means of cryptography and image processing - a deep learning based method
2025-1-1
Matrix-based homomorphic encryption-using random prime numbers
2025-1-1
Enhancement of data security in wireless sensors network: application in internet of things
2025-1-1
帮你贴心管理全部的文献
研飞ivySCI,高效的论文管理
投稿经验分享
分享我的经验,帮你走得更远