Economics at your fingertips  

International Journal of Digital Crime and Forensics (IJDCF)

2009 - 2016

From IGI Global
Bibliographic data for series maintained by Journal Editor ().

Access Statistics for this journal.
Track citations for all items by RSS feed
Is something missing from the series or not right? See the RePEc data check for the archive and series.

Volume 1, issue 4, 2009

Understanding the Process of Online Grooming: The Behavior of Men who Target Young People Online in Norway pp. 1-18 Downloads
Petter Gottschalk and Ragnar Kristoffersen
Reliable Motion Detection, Location and Audit in Surveillance Video pp. 19-31 Downloads
Amirsaman Poursoltanmohammadi and Matthew Sorell
Medical Images Authentication through Repetitive Index Modulation Based Watermarking pp. 32-39 Downloads
Chang-Tsun Li and Yue Li
Template Protection and Renewability for Dynamic Time Warping Based Biometric Signature Verification pp. 40-57 Downloads
Emanuele Maiorana, Patrizio Campisi and Alessandro Neri
Web-Based Child Pornography: Quantification and Qualification of Demand pp. 58-69 Downloads
Chad M.S. Steel

Volume 1, issue 3, 2009

Spam Image Clustering for Identifying Common Sources of Unsolicited Emails pp. 1-20 Downloads
Chengcui Zhang, Xin Chen, Wei-Bang Chen, Lin Yang and Gary Warner
Dynamic Structural Statistical Model Based Online Signature Verification pp. 21-41 Downloads
Yan Chen, Xiaoqing Ding and Patrick S.P. Wang
Volatile Memory Collection and Analysis for Windows Mission-Critical Computer Systems pp. 42-61 Downloads
Antonio Savoldi and Paolo Gubian
Robust Near Duplicate Image Matching for Digital Image Forensics pp. 62-79 Downloads
H.R. Chennamma, Lalitha Rangarajan and M.S. Rao
Evidentiary Implications of Potential Security Weaknesses in Forensic Software pp. 80-91 Downloads
Chris K. Ridder

Volume 1, issue 2, 2009

A Model Based Approach to Timestamp Evidence Interpretation pp. 1-12 Downloads
Svein Yngvar Willassen
Conditions for Effective Detection and Identification of Primary Quantisation of Re-Quantized JPEG Images pp. 13-27 Downloads
Matthew James Sorell
Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks pp. 28-41 Downloads
Dennis K. Nilsson and Ulf E. Larson
Reversible and Blind Database Watermarking Using Difference Expansion pp. 42-54 Downloads
Gaurav Gupta and Josef Pieprzyk
Methods to Identify Spammers pp. 55-68 Downloads
Tobias Eggendorfer
Dealing with Multiple Truths in Online Virtual Worlds pp. 69-82 Downloads
Jan Sablatnig, Fritz Lehmann-Grube, Sven Grottke and Sabine Cikic

Volume 1, issue 1, 2009

Providing Cryptographic Security and Evidentiary Chain-of-Custody with the Advanced Forensic Format, Library, and Tools pp. 1-28 Downloads
Simson L. Garfinkel
Locally Square Distortion and Batch Steganographic Capacity pp. 29-44 Downloads
Andrew D. Ker
Unexpected Artifacts in a Digital Photograph pp. 45-58 Downloads
Matthew J. Sorell
Efficient Forensic Analysis for Anonymous Attack in Secure Content Distribution pp. 59-74 Downloads
Hongxia Jin
Protection of Digital Mammograms on PACSs Using Data Hiding Techniques pp. 75-88 Downloads
Chang-Tsun Li, Yue Li and Chia-Hung Wei
Voice Over IP: Privacy and Forensic Implications pp. 89-101 Downloads
Jill Slay and Matthew Simon
Page updated 2019-11-24