Login / Signup
Int. J. Digit. Crime Forensics
2009
2013
2019
2024
2009
2024
Keyphrases
Publications
volume 16, 2024
Fuhai Jia
,
Yanru Jia
,
Jing Li
,
Zhenghui Liu
A Novel Watermarking Scheme for Audio Data Stored in Third Party Servers.
Int. J. Digit. Crime Forensics
16 (2024)
Dawei Zhang
Laboratory Dangerous Operation Behavior Detection System Based on Deep Learning Algorithm.
Int. J. Digit. Crime Forensics
16 (2024)
volume 15, number 1, 2023
Dawei Zhang
Abnormality Retrieval Method of Laboratory Surveillance Video Based on Deep Automatic Encoder.
Int. J. Digit. Crime Forensics
15 (1) (2023)
Vijay Kumar
,
Sahil Sharma
,
Chandan Kumar
,
Aditya Kumar Sahu
Latest Trends in Deep Learning Techniques for Image Steganography.
Int. J. Digit. Crime Forensics
15 (1) (2023)
Suzhen Wang
,
Yongchen Deng
,
Zhongbo Hu
Task Offloading in Cloud-Edge Environments: A Deep-Reinforcement-Learning-Based Solution.
Int. J. Digit. Crime Forensics
15 (1) (2023)
Heng Pan
,
Yaoyao Zhang
,
Jianmei Liu
,
Xueming Si
,
Zhongyuan Yao
,
Liang Zhao
MD-S3C3: A Medical Data Secure Sharing Scheme With Cloud and Chain Cooperation.
Int. J. Digit. Crime Forensics
15 (1) (2023)
Mathew Nicho
,
Maha Alblooki
,
Saeed AlMutiwei
,
Christopher D. McDermott
,
Olufemi Ilesanmi
A Crime Scene Reconstruction for Digital Forensic Analysis: An SUV Case Study.
Int. J. Digit. Crime Forensics
15 (1) (2023)
Wenjun Yao
,
Ying Jiang
,
Yang Yang
The Metric for Automatic Code Generation Based on Dynamic Abstract Syntax Tree.
Int. J. Digit. Crime Forensics
15 (1) (2023)
Yuwen Zhu
,
Lei Yu
Key Node Identification Based on Vulnerability Life Cycle and the Importance of Network Topology.
Int. J. Digit. Crime Forensics
15 (1) (2023)
Wei Wang
,
Longxing Xing
,
Na Xu
,
Jiatao Su
,
Wenting Su
,
Jiarong Cao
UAV Edge Caching Content Recommendation Algorithm Based on Graph Neural Network.
Int. J. Digit. Crime Forensics
15 (1) (2023)
Shi Cheng
,
Yan Qu
,
Chuyue Wang
,
Jie Wan
Assurance of Network Communication Information Security Based on Cyber-Physical Fusion and Deep Learning.
Int. J. Digit. Crime Forensics
15 (1) (2023)
volume 14, number 1, 2022
Louay Karadsheh
,
Haroun Alryalat
,
Ja'far Alqatawna
,
Samer Fawaz Alhawari
,
Mufleh Amin Al-Jarrah
The Impact of Social Engineer Attack Phases on Improved Security Countermeasures: Social Engineer Involvement as Mediating Variable.
Int. J. Digit. Crime Forensics
14 (1) (2022)
Chunyan Zeng
,
Yao Yang
,
Zhifeng Wang
,
Shuai Kong
,
Shixiong Feng
Audio Tampering Forensics Based on Representation Learning of ENF Phase Sequence.
Int. J. Digit. Crime Forensics
14 (1) (2022)
volume 14, number 2, 2022
Wenqian Jiang
,
Ce Zhang
,
Di Liu
,
Kaiwei Liu
,
Zhichao Sun
,
Jianyuan Wang
,
Zhongyin Qiu
,
Weigong Lv
SRGM Decision Model Considering Cost-Reliability.
Int. J. Digit. Crime Forensics
14 (2) (2022)
Ye Hua
,
Qu Xi Long
,
Li Zhen Jin
Monocular Depth Matching With Hybrid Sampling and Depth Label Propagation.
Int. J. Digit. Crime Forensics
14 (2) (2022)
Wan Chen
,
Daojun Han
,
Lei Zhang
,
Qi Xiao
,
Qiuyue Li
,
Hongzhen Xiang
A Model Study on Hierarchical Assisted Exploration of RBAC.
Int. J. Digit. Crime Forensics
14 (2) (2022)
Dawei Xu
,
Tianxin Chen
,
Zhonghua Tan
,
Fudong Wu
,
Jiaqi Gao
,
Yunfan Yang
Web Vulnerability Detection Analyzer Based on Python.
Int. J. Digit. Crime Forensics
14 (2) (2022)
Xiubo Liang
,
Yu Zhao
,
Junhan Wu
,
Keting Yin
A Privacy Protection Scheme for Cross-Chain Transactions Based on Group Signature and Relay Chain.
Int. J. Digit. Crime Forensics
14 (2) (2022)
Ran Zhang
,
Zhihan Pan
,
Yifeng Yin
,
Zengyu Cai
A Model of Network Security Situation Assessment Based on BPNN Optimized by SAA-SSA.
Int. J. Digit. Crime Forensics
14 (2) (2022)
Junchao Wang
,
Jin Wei
,
Jianmin Pang
,
Fan Zhang
,
Shunbin Li
Security Enhancement Through Compiler-Assisted Software Diversity With Deep Reinforcement Learning.
Int. J. Digit. Crime Forensics
14 (2) (2022)
Jing Wang
,
Jianhou Gan
,
Jun Wang
,
Juxiang Zhou
,
Zeguang Lu
Face Anonymity Based on Facial Pose Consistency.
Int. J. Digit. Crime Forensics
14 (2) (2022)
Shaobo Zhang
,
Yuhang Liu
,
Dequan Yang
A Novel IDS Securing Industrial Control System of Critical Infrastructure Using Deception Technology.
Int. J. Digit. Crime Forensics
14 (2) (2022)
volume 14, number 3, 2022
Zengyu Cai
,
Chunchen Tan
,
Jianwei Zhang
,
Tengteng Xiao
,
Yuan Feng
An Unhealthy Webpage Discovery System Based on Convolutional Neural Network.
Int. J. Digit. Crime Forensics
14 (3) (2022)
Dongmei Zang
,
Xinlei Sheng
,
Liya Wang
,
Aimin Yang
,
Tao Xue
,
Jie Li
Research and Application of Warship Multiattribute Threat Assessment Based on Improved TOPSIS Gray Association Analysis.
Int. J. Digit. Crime Forensics
14 (3) (2022)
Fan Zhang
,
Wei Chen
,
Yongqiong Zhu
Golden Eye: An OS-Independent Algorithm for Recovering Files From Hard-Disk Raw Images.
Int. J. Digit. Crime Forensics
14 (3) (2022)
Shannan Liu
,
Ronghua Zhang
,
Changzheng Liu
,
Chenxi Xu
,
Jie Zhou
,
Jiaojiao Wang
Improvement of the PBFT Algorithm Based on Grouping and Reputation Value Voting.
Int. J. Digit. Crime Forensics
14 (3) (2022)
Guiyan Cai
,
Liang Qu
,
Yongdong Li
,
Guoan Cheng
,
Xin Lu
,
Yiqi Wang
,
Fengqin Yao
,
Shengke Wang
Semisupervised Surveillance Video Character Extraction and Recognition With Attentional Learning Multiframe Fusion.
Int. J. Digit. Crime Forensics
14 (3) (2022)
Runde Yu
,
Xianwei Zhang
,
Yimeng Zhang
,
Jianfeng Song
,
Kang Liu
,
Qiguang Miao
Design and Implementation of Identity Verification Software Based on Deep Learning.
Int. J. Digit. Crime Forensics
14 (3) (2022)
volume 13, number 5, 2021
Rajashree Soman
,
Sukumar R.
Secure Storage and Sharing of Visitor Images Generated by Smart Entrance on Public Cloud.
Int. J. Digit. Crime Forensics
13 (5) (2021)
Rupa Ch
,
Sumaiya Shaikh
,
Mukesh Chinta
Multimedia Concealed Data Detection Using Quantitative Steganalysis.
Int. J. Digit. Crime Forensics
13 (5) (2021)
M. Sravan Kumar Reddy
,
Dharmendra Singh Rajput
Design and Development of Ternary-Based Anomaly Detection in Semantic Graphs Using Metaheuristic Algorithm.
Int. J. Digit. Crime Forensics
13 (5) (2021)
Ashok Kumar Mohan
,
Sethumadhavan Madathil
,
K. V. Lakshmy
Holistic Analytics of Digital Artifacts: Unique Metadata Association Model.
Int. J. Digit. Crime Forensics
13 (5) (2021)
volume 13, number 6, 2021
Guan-Zhong Wu
,
Xiangyu Yu
,
Hui Liang
,
Minting Li
Two-Step Image-in-Image Steganography via GAN.
Int. J. Digit. Crime Forensics
13 (6) (2021)
Lei Yu
,
Haoyu Wang
,
Linyu Li
,
Houhua He
Towards Automated Detection of Higher-Order Command Injection Vulnerabilities in IoT Devices: Fuzzing With Dynamic Data Flow Analysis.
Int. J. Digit. Crime Forensics
13 (6) (2021)
Muhammad Abulaish
,
Nur Al Hasan Haldar
,
Jahiruddin
P2DF: A Privacy-Preserving Digital Forensics Framework.
Int. J. Digit. Crime Forensics
13 (6) (2021)
Lianshan Liu
,
Xiaoli Wang
,
Lingzhuang Meng
,
Gang Tian
,
Ting Wang
Reversible Data Hiding in a Chaotic Encryption Domain Based on Odevity Verification.
Int. J. Digit. Crime Forensics
13 (6) (2021)
Kaixi Wang
,
Xiangmei Yu
,
Ziyi Zou
A Coverless Text Steganography by Encoding the Chinese Characters' Component Structures.
Int. J. Digit. Crime Forensics
13 (6) (2021)
Hai Lu
,
Liping Shao
,
Qinglong Wang
A High Capacity Test Disguise Method Combined With Interpolation Backup and Double Authentications.
Int. J. Digit. Crime Forensics
13 (6) (2021)
Rizwan Ur Rahman
,
Deepak Singh Tomar
Web Bot Detection System Based on Divisive Clustering and K-Nearest Neighbor Using Biostatistics Features Set.
Int. J. Digit. Crime Forensics
13 (6) (2021)
Digambar Pawar
,
Mayank Gajpal
Image Forensic Tool (IFT): Image Retrieval, Tampering Detection, and Classification.
Int. J. Digit. Crime Forensics
13 (6) (2021)
Shantanu Jana
,
Nibaran Das
,
Subhadip Basu
,
Mita Nasipuri
Survey of Human Gait Analysis and Recognition for Medical and Forensic Applications.
Int. J. Digit. Crime Forensics
13 (6) (2021)
Xiangling Ding
,
Yanming Huang
,
Dengyong Zhang
,
Junlin Ouyang
Identification of Interpolated Frames by Motion-Compensated Frame-Interpolation via Measuring Irregularity of Optical Flow.
Int. J. Digit. Crime Forensics
13 (6) (2021)
Shane Miller
,
Kevin Curran
,
Tom Lunney
Detection of Anonymising Proxies Using Machine Learning.
Int. J. Digit. Crime Forensics
13 (6) (2021)
Yitong Meng
,
Jinlong Fei
Hidden Service Circuit Reconstruction Attacks Based on Middle Node Traffic Analysis.
Int. J. Digit. Crime Forensics
13 (6) (2021)
Pankaj Kumar Keserwani
,
Mahesh Chandra Govil
,
Emmanuel S. Pilli
,
Prajjval Govil
An Optimal NIDS for VCN Using Feature Selection and Deep Learning Technique: IDS for VCN.
Int. J. Digit. Crime Forensics
13 (6) (2021)
Shane Miller
,
Kevin Curran
,
Tom Lunney
Identifying the Use of Anonymising Proxies to Conceal Source IP Addresses.
Int. J. Digit. Crime Forensics
13 (6) (2021)
Yong Liu
,
Dawen Xu
HEVC Information-Hiding Algorithm Based on Intra-Prediction and Matrix Coding.
Int. J. Digit. Crime Forensics
13 (6) (2021)
Di Xiao
,
Jia Liang
,
Yanping Xiang
,
Jiaqi Zhou
Cloud-Assisted Image Double Protection System With Encryption and Data Hiding Based on Compressive Sensing.
Int. J. Digit. Crime Forensics
13 (6) (2021)
Guangxuan Chen
,
Guangxiao Chen
,
Lei Zhang
,
Qiang Liu
An Incremental Acquisition Method for Web Forensics.
Int. J. Digit. Crime Forensics
13 (6) (2021)
Alex Yao Chu Zhu
,
Wei-Qi Yan
,
Roopak Sinha
ROP Defense Using Trie Graph for System Security.
Int. J. Digit. Crime Forensics
13 (6) (2021)