IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Research IRM InfoSci-OnDemand Powered Search

Search terms:  


Search Reset Total results: 1374
Full text: Title:
Keyword: Author/editor:
ISBN/ISSN: DOI:
Content:
Search Reset
Term Exclude Inflectional Weight
Add New Term
Search Reset
Keywords:  
Search Reset
Subject:  
Search Reset
Sort by:
rank
Book Chapter
Physical Layer Security and Its Applications: A Survey
Rajesh K. Sharma (2014). Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications 32 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
The Relationship Between Digital Forensics, Corporate Governance, IT Governance, and IS Governance
S.H. (Basie) von Solms, C.P. (Buks) Louwrens (2006). Digital Crime and Forensic Science in Cyberspace 24 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
A Review of Current Research in Network Forensic Analysis
Ikuesan R. Adeyemi, Shukor Abd Razak, Nor Amira Nor Azhan (2013). International Journal of Digital Crime and Forensics 26 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
A Forensic Tool for Investigating Image Forgeries
Marco Fontani, Tiziano Bianchi, Alessia De Rosa, Alessandro Piva, Mauro Barni (2013). International Journal of Digital Crime and Forensics 19 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Watch What You Wear: Smartwatches and Sluggish Security
Joseph Ricci, Ibrahim Baggili, Frank Breitinger (2017). Managing Security Issues and the Hidden Dangers of Wearable Technologies 27 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Recognizing Substitution Steganography of Spatial Domain Based on the Characteristics of Pixels Correlation
Zhe Chen, Jicang Lu, Pengfei Yang, Xiangyang Luo (2017). International Journal of Digital Crime and Forensics 14 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
On More Paradigms of Steganalysis
Xianfeng Zhao, Jie Zhu, Haibo Yu (2016). International Journal of Digital Crime and Forensics 15 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Flow-Graph and Markovian Methods for Cyber Security Analysis
Kouroush Jenab, Sam Khoury, Kim LaFevor (2016). International Journal of Enterprise Information Systems 26 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Source Camera Identification Based on Sensor Readout Noise
H. R. Chennamma, Lalitha Rangarajan (2010). International Journal of Digital Crime and Forensics 15 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Source Camera Identification Based on Sensor Readout Noise
H. R. Chennamma, Lalitha Rangarajan (2012). Crime Prevention Technologies and Applications for Advancing Criminal Investigation 14 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Privacy Concerns with Digital Forensics
Neil C. Rowe (2016). Ethical Issues and Citizen Rights in the Era of Digital Government Surveillance 18 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Tradeoffs Between Forensics and Anti-Forensics of Digital Images
Priya Makarand Shelke, Rajesh Shardanand Prasad (2017). International Journal of Rough Sets and Data Analysis 14 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Copy-Move Forgery Detection Using DyWT
Choudhary Shyam Prakash, Sushila Maheshkar (2017). International Journal of Multimedia Data Engineering and Management 9 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Forensic Investigations in Cloud Computing
Diane Barrett (2018). Encyclopedia of Information Science and Technology, Fourth Edition 10 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
A Steganalytic Scheme Based on Classifier Selection Using Joint Image Characteristics
Jie Zhu, Qingxiao Guan, Xianfeng Zhao, Yun Cao, Gong Chen (2017). International Journal of Digital Crime and Forensics 14 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Source Camera Identification Issues: Forensic Features Selection and Robustness
Yongjian Hu, Chang-Tsun Li, Changhui Zhou, Xufeng Lin (2011). International Journal of Digital Crime and Forensics 15 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
A Survey of Digital Forensic Techniques for Digital Libraries
Yue Li (2011). International Journal of Digital Library Systems 18 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Robust Image Hashing
Daniela Coltuc (2015). Encyclopedia of Information Science and Technology, Third Edition 11 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Digital Camera Photographic Provenance
Matthew Sorell (2010). Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions 26 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Tampering Localization in Double Compressed Images by Investigating Noise Quantization
Archana Vasant Mire, Sanjay B. Dhok, Naresh J. Mistry, Prakash D. Porey (2016). International Journal of Digital Crime and Forensics 17 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
PCI Compliance: Overcoming the Challenges
Benjamin Ngugi, Gina Vega, Glenn Dardick (2009). International Journal of Information Security and Privacy 14 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
A Comparative Survey on Cryptology-Based Methodologies
Allan Rwabutaza, Ming Yang, Nikolaos Bourbakis (2012). International Journal of Information Security and Privacy 37 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Digital Image Authentication: A Review
Yue Li, Chia-Hung Wei (2011). International Journal of Digital Library Systems 24 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
A Survey of Digital Forensic Techniques for Digital Libraries
Yue Li (2013). Modern Library Technologies for Data Storage, Retrieval, and Use 20 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Localization of Tampering Created with Facebook Images by Analyzing Block Factor Histogram Voting
Archana V. Mire, Sanjay B. Dhok, Narendra. J. Mistry, Prakash D. Porey (2015). International Journal of Digital Crime and Forensics 22 pages.
View Details View Details PDF Full Text View Sample PDF
First Previous 1 2 3 4 5 6 7 8 9 10  ... Next Last 
InfoSci-OnDemand Powered Search
Body Bottom