|
The Future of Digital Forensics |
|
|
|
Deconstruct and Preserve (DaP): A Method for the Preservation of Digital Evidence on Solid State Drives (SSD) |
|
|
3 | (9) |
|
|
|
|
|
|
Bitcoin Forensics: A Tutorial |
|
|
12 | (15) |
|
|
|
|
Forensic Analysis of Secure Ephemeral Messaging Applications on Android Platforms |
|
|
27 | (15) |
|
|
Thomas Edward Allen Barton |
|
|
Digital Evidence: Disclosure and Admissibility in the United Kingdom Jurisdiction |
|
|
42 | (11) |
|
|
Combating Cyber Dependent Crimes: The Legal Framework in the UK |
|
|
53 | (16) |
|
|
Cyber Intelligence and Operation |
|
|
|
Aspects of Voice Communications Fraud |
|
|
69 | (13) |
|
|
|
Scalable Frameworks for Application Security and Data Protection |
|
|
82 | (14) |
|
|
Balancing Targeted Delivery of Content and Personal Freedom in the Digital On-line Video Marketing Landscape |
|
|
96 | (10) |
|
|
Sergio Tenreiro de Magalhaes |
|
|
|
|
Towards an Enterprise Architecture Framework for Community Policing |
|
|
106 | (7) |
|
|
|
A Scalable Malware Classification Based on Integrated Static and Dynamic Features |
|
|
113 | (12) |
|
|
|
|
|
Source Camera Identification Using Non-decimated Wavelet Transform |
|
|
125 | (9) |
|
|
|
|
Content Discovery Advertisements: An Explorative Analysis |
|
|
134 | (10) |
|
Raghavender Rao Jadhav Balaji |
|
|
|
|
|
Phishing-Deception Data Model for Online Detection and Human Protection |
|
|
144 | (11) |
|
|
|
Cyber Attacks Analysis Using Decision Tree Technique for Improving Cyber Situational Awareness |
|
|
155 | (18) |
|
|
|
|
ITAOFIR: IT Asset Ontology for Information Risk in Knowledge Economy and Beyond |
|
|
173 | (18) |
|
|
|
|
Information Systems Security Management |
|
|
|
Disaster Management System as an Element of Risk Management for Natural Disaster Systems Using the PESTLE Framework |
|
|
191 | (14) |
|
|
|
|
A Review on Privacy Issues in Hotels: A Contribution to the Definition of Information Security Policies and Marketing Strategies |
|
|
205 | (13) |
|
|
Sergio Tenreiro de Magalhaes |
|
|
|
|
Tor Marketplaces Exploratory Data Analysis: The Drugs Case |
|
|
218 | (12) |
|
|
|
|
User Acceptance of Information Technology: A Critical Review of Technology Acceptance Models and the Decision to Invest in Information Security |
|
|
230 | (22) |
|
|
|
|
Application of a Digraph for Behavioural Eye Tracking Biometrics |
|
|
252 | (14) |
|
|
Behavioural Biometrics for Authentication and Stress Detection --- A Case Study with Children |
|
|
266 | (15) |
|
|
|
|
|
Using Dual Trigger Handover Algorithm to Improve WiMAX Handover Delay |
|
|
281 | (9) |
|
|
|
Social Media and E-Voting --- A Secure and Trusted Political Forum for Palestine |
|
|
290 | (15) |
|
|
|
Systems Security, Safety and Sustainability Cyber Infrastructure Protection |
|
|
|
Actor-Network Theory as a Framework to Analyse Technology Acceptance Model's External Variables: The Case of Autonomous Vehicles |
|
|
305 | (16) |
|
|
|
|
|
|
The Future of Enterprise Security with Regards to Mobile Technology and Applications |
|
|
321 | (10) |
|
|
|
Chemical, Biological, Radiological and Nuclear (CBRN) Protective Clothing --- A Review |
|
|
331 | (11) |
|
|
Sergio Tenreiro de Magalhaes |
|
|
|
|
Performance Analysis for Traffics in Mobile Ad Hoc Network |
|
|
342 | (9) |
|
|
|
Global Triumph or Exploitation of Security and Privacy Concerns in E-Learning Systems |
|
|
351 | (13) |
|
|
|
|
Efficient Energy and Processes Time Algorithm for Offloading Using Cloud Computing |
|
|
364 | (7) |
|
|
Sufian Yousef Faris Albaadani |
|
|
|
A Novel Anonymity Quantification and Preservation Model for UnderNet Relay Networks |
|
|
371 | (14) |
|
|
|
|
|
|
A Novel Energy Sleep Mode Based on Standard Deviation `ESMSD' Algorithm for Adaptive Clustering in MANETs |
|
|
385 | (9) |
|
|
|
|
|
|
|
|
Facial Recognition Cane for the Visually Impaired |
|
|
394 | (13) |
|
|
Author Index |
|
407 | |