Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
Network security attack classification: leveraging machine learning methods for enhanced detection and defence
International Journal of Electronic Security and Digital Forensics (IJESDF), Volume 17, Issue 1-2Pages 138–148https://doi.org/10.1504/ijesdf.2025.143478The rapid growth and advancement of information exchange over the internet and mobile technologies have resulted in a significant increase in malicious network attacks. Machine learning (ML) algorithms have emerged as crucial tools in network security ...
- research-articleJanuary 2023
Cloud forensics-enabled chain of custody: a novel and secure modular architecture using Blockchain Hyperledger Sawtooth
International Journal of Electronic Security and Digital Forensics (IJESDF), Volume 15, Issue 4Pages 413–423https://doi.org/10.1504/ijesdf.2023.131959The exchange of digital information has significantly emerged in the last decade. The increased number of cyber threats over the cloud increases the rate of utilisation of cloud forensics protocols. The lifecycle of cloud computing is getting more ...