IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Research IRM InfoSci-OnDemand Powered Search

Search terms:  


Search Reset Total results: 1580
Full text: Title:
Keyword: Author/editor:
ISBN/ISSN: DOI:
Content:
Search Reset
Term Exclude Inflectional Weight
Add New Term
Search Reset
Keywords:  
Search Reset
Subject:  
Search Reset
Sort by:
rank
Book Chapter
Physical Layer Security and Its Applications: A Survey
Rajesh K. Sharma (2014). Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications 32 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
The Relationship Between Digital Forensics, Corporate Governance, IT Governance, and IS Governance
S.H. (Basie) von Solms, C.P. (Buks) Louwrens (2006). Digital Crime and Forensic Science in Cyberspace 24 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
A Comparative Review of Various Machine Learning Approaches for Improving the Performance of Stego Anomaly Detection
Hemalatha Jeyaprakash, KavithaDevi M. K., Geetha S. (2018). Handbook of Research on Network Forensics and Analysis Techniques 21 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
A Review of Current Research in Network Forensic Analysis
Ikuesan R. Adeyemi, Shukor Abd Razak, Nor Amira Nor Azhan (2013). International Journal of Digital Crime and Forensics 26 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
A Forensic Tool for Investigating Image Forgeries
Marco Fontani, Tiziano Bianchi, Alessia De Rosa, Alessandro Piva, Mauro Barni (2013). International Journal of Digital Crime and Forensics 19 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Watch What You Wear: Smartwatches and Sluggish Security
Joseph Ricci, Ibrahim Baggili, Frank Breitinger (2017). Managing Security Issues and the Hidden Dangers of Wearable Technologies 27 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Watch What You Wear: Smartwatches and Sluggish Security
Joseph Ricci, Ibrahim Baggili, Frank Breitinger (2018). Wearable Technologies: Concepts, Methodologies, Tools, and Applications 21 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
A Recent Study on High Dimensional Features Used in Stego Image Anomaly Detection
Hemalatha J, KavithaDevi M.K., Geetha S. (2018). Applications of Security, Mobile, Analytic, and Cloud (SMAC) Technologies for Effective Information Processing and Management 18 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Recognizing Substitution Steganography of Spatial Domain Based on the Characteristics of Pixels Correlation
Zhe Chen, Jicang Lu, Pengfei Yang, Xiangyang Luo (2017). International Journal of Digital Crime and Forensics 14 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Flow-Graph and Markovian Methods for Cyber Security Analysis
Kouroush Jenab, Sam Khoury, Kim LaFevor (2018). Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications 29 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
On More Paradigms of Steganalysis
Xianfeng Zhao, Jie Zhu, Haibo Yu (2016). International Journal of Digital Crime and Forensics 15 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Flow-Graph and Markovian Methods for Cyber Security Analysis
Kouroush Jenab, Sam Khoury, Kim LaFevor (2016). International Journal of Enterprise Information Systems 26 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Blind Image Source Device Identification: Practicality and Challenges
Udaya Sameer Venkata, Ruchira Naskar (2018). International Journal of Information Security and Privacy 16 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Source Camera Identification Based on Sensor Readout Noise
H. R. Chennamma, Lalitha Rangarajan (2010). International Journal of Digital Crime and Forensics 15 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Source Camera Identification Based on Sensor Readout Noise
H. R. Chennamma, Lalitha Rangarajan (2012). Crime Prevention Technologies and Applications for Advancing Criminal Investigation 14 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Privacy Concerns with Digital Forensics
Neil C. Rowe (2016). Ethical Issues and Citizen Rights in the Era of Digital Government Surveillance 18 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Tradeoffs Between Forensics and Anti-Forensics of Digital Images
Priya Makarand Shelke, Rajesh Shardanand Prasad (2017). International Journal of Rough Sets and Data Analysis 14 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Tradeoffs Between Forensics and Anti-Forensics of Digital Images
Priya Makarand Shelke, Rajesh Shardanand Prasad (2018). Computer Vision: Concepts, Methodologies, Tools, and Applications 15 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Copy-Move Forgery Detection Using DyWT
Choudhary Shyam Prakash, Sushila Maheshkar (2017). International Journal of Multimedia Data Engineering and Management 9 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Digital Image Splicing Detection Based on Markov Features in QDCT and QWT Domain
Ruxin Wang, Wei Lu, Jixian Li, Shijun Xiang, Xianfeng Zhao, Jinwei Wang (2018). International Journal of Digital Crime and Forensics 18 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Fingerprint Image Hashing Based on Minutiae Points and Shape Context
Sani M. Abdullahi, Hongxia Wang, Asad Malik (2018). International Journal of Digital Crime and Forensics 20 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Role of Cyber Security and Cyber Forensics in India
Gulshan Shrivastava, Kavita Sharma, Manju Khari, Syeda Erfana Zohora (2018). Handbook of Research on Network Forensics and Analysis Techniques 19 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Forensic Investigations in Cloud Computing
Diane Barrett (2018). Encyclopedia of Information Science and Technology, Fourth Edition 10 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
A Steganalytic Scheme Based on Classifier Selection Using Joint Image Characteristics
Jie Zhu, Qingxiao Guan, Xianfeng Zhao, Yun Cao, Gong Chen (2017). International Journal of Digital Crime and Forensics 14 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Source Camera Identification Issues: Forensic Features Selection and Robustness
Yongjian Hu, Chang-Tsun Li, Changhui Zhou, Xufeng Lin (2011). International Journal of Digital Crime and Forensics 15 pages.
View Details View Details PDF Full Text View Sample PDF
First Previous 1 2 3 4 5 6 7 8 9 10  ... Next Last 
InfoSci-OnDemand Powered Search
Body Bottom