IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Research IRM InfoSci-OnDemand Powered Search

Search terms:  


Search Reset Total results: 1723
Full text: Title:
Keyword: Author/editor:
ISBN/ISSN: DOI:
Content:
Search Reset
Term Exclude Inflectional Weight
Add New Term
Search Reset
Keywords:  
Search Reset
Subject:  
Search Reset
Sort by:
rank
Book Chapter
Physical Layer Security and Its Applications: A Survey
Rajesh K. Sharma (2014). Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications 32 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
The Relationship Between Digital Forensics, Corporate Governance, IT Governance, and IS Governance
S.H. (Basie) von Solms, C.P. (Buks) Louwrens (2006). Digital Crime and Forensic Science in Cyberspace 24 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
A Comparative Review of Various Machine Learning Approaches for Improving the Performance of Stego Anomaly Detection
Hemalatha Jeyaprakash, KavithaDevi M. K., Geetha S. (2018). Handbook of Research on Network Forensics and Analysis Techniques 21 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
A Review of Current Research in Network Forensic Analysis
Ikuesan R. Adeyemi, Shukor Abd Razak, Nor Amira Nor Azhan (2013). International Journal of Digital Crime and Forensics 26 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
A Forensic Tool for Investigating Image Forgeries
Marco Fontani, Tiziano Bianchi, Alessia De Rosa, Alessandro Piva, Mauro Barni (2013). International Journal of Digital Crime and Forensics 19 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Breaking Steganography: Slight Modification with Distortion Minimization
Zhenxing Qian, Zichi Wang, Xinpeng Zhang, Guorui Feng (2019). International Journal of Digital Crime and Forensics 12 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Watch What You Wear: Smartwatches and Sluggish Security
Joseph Ricci, Ibrahim Baggili, Frank Breitinger (2017). Managing Security Issues and the Hidden Dangers of Wearable Technologies 27 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Watch What You Wear: Smartwatches and Sluggish Security
Joseph Ricci, Ibrahim Baggili, Frank Breitinger (2018). Wearable Technologies: Concepts, Methodologies, Tools, and Applications 21 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
A Recent Study on High Dimensional Features Used in Stego Image Anomaly Detection
Hemalatha J, KavithaDevi M.K., Geetha S. (2018). Applications of Security, Mobile, Analytic, and Cloud (SMAC) Technologies for Effective Information Processing and Management 18 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Recognizing Substitution Steganography of Spatial Domain Based on the Characteristics of Pixels Correlation
Zhe Chen, Jicang Lu, Pengfei Yang, Xiangyang Luo (2017). International Journal of Digital Crime and Forensics 14 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Flow-Graph and Markovian Methods for Cyber Security Analysis
Kouroush Jenab, Sam Khoury, Kim LaFevor (2018). Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications 29 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
On More Paradigms of Steganalysis
Xianfeng Zhao, Jie Zhu, Haibo Yu (2016). International Journal of Digital Crime and Forensics 15 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Flow-Graph and Markovian Methods for Cyber Security Analysis
Kouroush Jenab, Sam Khoury, Kim LaFevor (2016). International Journal of Enterprise Information Systems 26 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Image Steganalysis in High-Dimensional Feature Spaces with Proximal Support Vector Machine
Ping Zhong, Mengdi Li, Kai Mu, Juan Wen, Yiming Xue (2019). International Journal of Digital Crime and Forensics 12 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Blind Image Source Device Identification: Practicality and Challenges
Udaya Sameer Venkata, Ruchira Naskar (2018). International Journal of Information Security and Privacy 16 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Detecting and Distinguishing Adaptive and Non-Adaptive Steganography by Image Segmentation
Jie Zhu, Xianfeng Zhao, Qingxiao Guan (2019). International Journal of Digital Crime and Forensics 16 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Asymmetric Distortion Function for JPEG Steganography Using Block Artifact Compensation
Zichi Wang, Zhaoxia Yin, Xinpeng Zhang (2019). International Journal of Digital Crime and Forensics 10 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Source Camera Identification Based on Sensor Readout Noise
H. R. Chennamma, Lalitha Rangarajan (2010). International Journal of Digital Crime and Forensics 15 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Source Camera Identification Based on Sensor Readout Noise
H. R. Chennamma, Lalitha Rangarajan (2012). Crime Prevention Technologies and Applications for Advancing Criminal Investigation 14 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Privacy Concerns with Digital Forensics
Neil C. Rowe (2016). Ethical Issues and Citizen Rights in the Era of Digital Government Surveillance 18 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Improving Cyber Defense Education through National Standard Alignment: Case Studies
Ping Wang, Maurice Dawson, Kenneth L Williams (2018). International Journal of Hyperconnectivity and the Internet of Things 17 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Tradeoffs Between Forensics and Anti-Forensics of Digital Images
Priya Makarand Shelke, Rajesh Shardanand Prasad (2017). International Journal of Rough Sets and Data Analysis 14 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Tradeoffs Between Forensics and Anti-Forensics of Digital Images
Priya Makarand Shelke, Rajesh Shardanand Prasad (2018). Computer Vision: Concepts, Methodologies, Tools, and Applications 15 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Copy-Move Forgery Detection Using DyWT
Choudhary Shyam Prakash, Sushila Maheshkar (2017). International Journal of Multimedia Data Engineering and Management 9 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Forensic Investigations in Cloud Computing
Diane Barrett (2019). Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics 12 pages.
View Details View Details PDF Full Text View Sample PDF
First Previous 1 2 3 4 5 6 7 8 9 10  ... Next Last 
InfoSci-OnDemand Powered Search
Body Bottom