default search action
ISDFS 2020: Beirut, Lebanon
- 8th International Symposium on Digital Forensics and Security, ISDFS 2020, Beirut, Lebanon, June 1-2, 2020. IEEE 2020, ISBN 978-1-7281-6939-2
- Mazoon AlRoubiei, Thuraiya AlYarubi, Basant Kumar:
Critical Analysis of Cryptographic Algorithms. 1-7 - Hussein Faroq Tayeb, Murat Karabatak, Cihan Varol:
Time Series Database Preprocessing for Data Mining Using Python. 1-4 - Christine Orosco, Cihan Varol, Narasimha K. Shashidhar:
Graphically Display Database Transactions to Enhance Database Forensics. 1-6 - Müslim Alanoglu, Songül Karabatak:
Students' Usage of Smartphones during the Lectures. 1-4 - Marie-Rose Boueiz:
Importance of rooting in an Android data acquisition. 1-4 - Abdalbasit Mohammed Qadir, Asaf Varol:
The Role of Machine Learning in Digital Forensics. 1-5 - Nevzat Olgun, Ibrahim Türkoglu:
Classification of Live/Lifeless Assets with Laser Beams in Different Humidity Environments. 1-6 - Innocent Agbo, Alexander V. Kupriyanov, Igor Rytsarev:
Big Data Architecture: Designing the Right Solution for Social Network Analysis. 1-5 - Anna Egorova, Victor Fedoseev:
QIM-Based Semi-Fragile Watermarking for H.264 Video Authentication. 1-6 - Safa Aktepe, Cihan Varol, Narasimha K. Shashidhar:
MiNo: The Chrome Web Browser Add-on Application to Block the Hidden Cryptocurrency Mining Activities. 1-5 - Peshraw Ahmed Abdalla, Cihan Varol:
Testing IoT Security: The Case Study of an IP Camera. 1-5 - Mikhail Gashnikov:
Decision-Tree-Based Interpolation for Multidimensional Signal Compression. 1-5 - Deepa Muraleedharan, Sanil. K. Daniel:
An efficient IP core of Consultative Committee for Space Data Systems (CCSDS) Recommended Authenticated Cryptographic Algorithm. 1-6 - Hussein Majed, Hassan N. Noura, Ali Chehab:
Overview of Digital Forensics and Anti-Forensics Techniques. 1-5 - Andrey Kuznetsov, Mikhail Gashnikov:
Remote Sensing Image Inpainting with Generative Adversarial Networks. 1-6 - Andrew Johnson, Richard Ward:
Introducing The 'Unified Side Channel Attack - Model' (USCA-M). 1-9 - Pawan Sh. Othman, Ridwan B. Marqas, Diler N. Abdulqader, Saman M. Almufti:
Effect of Mean Filter on Face Image from Video Frames. 1-7 - Yasser Fadlallah, Mohamad Sbeiti, Mohamad Hammoud, Mohamad Nehme, Ahmad Fadlallah:
On the Cyber Security of Lebanon: A Large Scale Empirical Study of Critical Vulnerabilities. 1-6 - Mohammed Hussein Abdalla, Murat Karabatak:
To Review and Compare Evolutionary Algorithms in Optimization of Distributed Database Query. 1-5 - Muhammad Raheel Raza, Asaf Varol:
QoS Parameters for Viable SLA in Cloud. 1-5 - Yuliya D. Vybornova:
Method for Image Copyright Protection Based on Construction of Highly Robust Watermarks. 1-4 - Luis Francisco Plá, Narasimha K. Shashidhar, Cihan Varol:
On-Premises Versus SECaaS Security Models. 1-6 - Habib Ibrahim, Asaf Varol:
A Study on Automatic Speech Recognition Systems. 1-5 - Bashir Zak Adamu, Murat Karabatak, Fatih Ertam:
A Conceptual Framework for Database Anti-forensics Impact Mitigation. 1-6 - Kok Seen Chong, Chern Nam Yap, Zheng Hong Tew:
Multi-Key Homomorphic Encryption Create new Multiple Logic Gates and Arithmetic Circuit. 1-4 - Samiha S. Shimmi, Gokila Dorai, Umit Karabiyik, Sudhir Aggarwal:
Analysis of iOS SQLite Schema Evolution for Updating Forensic Data Extraction Tools. 1-7 - Abdulazeez Mousa, Murat Karabatak, Twana Mustafa:
Database Security Threats and Challenges. 1-5 - Abdelhalim Badr, Aliaa Youssif, Maged Wafi:
A Robust Copy-Move Forgery Detection In Digital Image Forensics Using SURF. 1-6 - Ersin Enes Eryilmaz, Durmus Özkan Sahin, Erdal Kiliç:
Filtering Turkish Spam Using LSTM From Deep Learning Techniques. 1-6 - Hassan N. Noura, Ali Chehab, Raphaël Couturier:
Overview of Efficient Symmetric Cryptography: Dynamic vs Static Approaches. 1-6 - Samar M. Alkhuraiji:
Cinema Station Application (CSA): An augmented reality application for accessing film information and online cinema booking. 1-6 - Abdalbasit Mohammed Qadir, Peter Cooper:
GPS-based Mobile Cross-platform Cargo Tracking System with Web-based Application. 1-7 - Mohammad Meraj Mirza, Fahad E. Salamh, Umit Karabiyik:
An Android Case Study on Technical Anti-Forensic Challenges of WhatsApp Application. 1-6 - Awf Abdulrahman, Serkan Varol:
A Review of Image Segmentation Using MATLAB Environment. 1-5 - Twana Mustafa, Asaf Varol:
Review of the Internet of Things for Healthcare Monitoring. 1-6 - Songül Karabatak, Murat Karabatak:
Z Generation Students and Their Digital Footprints. 1-5 - Thamali Madhushani Adhikari, Yan Wu:
Classifying Software Vulnerabilities by Using the Bugs Framework. 1-6 - Iliyasu Yahaya Adam, Cihan Varol:
Intelligence in Digital Forensics Process. 1-6 - Zina Balani, Hacer Varol:
Cloud Computing Security Challenges and Threats. 1-4 - Hasan k. Idriss:
Mirai Botnet In Lebanon. 1-6 - Salim Jibrin Danbatta, Asaf Varol:
Predicting Student's Final Graduation CGPA Using Data Mining and Regression Methods: A Case Study of Kano Informatics Institute. 1-7 - Chawan Taha Hama Ali, Asaf Varol:
Design and Implementation of a Simple Online Court Case Management System Based on the Android Platform. 1-4 - Songül Karabatak, Müslim Alanoglu, Murat Karabatak:
Effects of Homework Supported Distance Education on Academic Satisfaction, Academic Achievement, and Attitude towards Distance Education. 1-5 - Yesim Ülgen Sönmez, Asaf Varol:
In-Depth Analysis of Speech Production, Auditory System, Emotion Theories and Emotion Recognition. 1-8 - Habib Ibrahim, Songül Karabatak, Abdullahi Abba Abdullahi:
A Study on Cybersecurity Challenges in E-learning and Database Management System. 1-5 - Murat Karabatak, Twana Mustafa, Chawan Hamaali:
Remote Monitoring Real Time Air pollution - IoT (Cloud Based). 1-6 - Shaheryar Ehsan I Haque, Shahzad Saleem:
Augmented reality based criminal investigation system (ARCRIME). 1-6 - Aina'u Shehu Muhammed, Derya Ucuz:
Comparison of the IoT Platform Vendors, Microsoft Azure, Amazon Web Services, and Google Cloud, from Users' Perspectives. 1-4 - Derrick Berger, Narasimha K. Shashidhar, Cihan Varol:
Using ITIL 4 in Security Management. 1-6 - Sundar Krishnan, Bing Zhou:
Predicting Crime Scene Location Details for First Responders. 1-7 - Muhammad Raheel Raza, Asaf Varol, Nurhayat Varol:
Cloud and Fog Computing: A Survey to the Concept and Challenges. 1-6 - Shalaw Mshir, Mehmet Kaya:
Signature Recognition Using Machine Learning. 1-4 - Reem A. Nabha, Hassan Sbeyti:
Exploiting Vulnerabilities Of MRI Scanner Machine: Lebanon Case Study. 1-7 - Steven Zavala, Narasimha K. Shashidhar, Cihan Varol:
Cybersecurity Evaluation with PowerShell. 1-6 - Lazaro A. Herrera:
Challenges of acquiring mobile devices while minimizing the loss of usable forensics data. 1-5 - Neil Andes, Mingkui Wei:
District Ransomware: Static and Dynamic Analysis. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.