Subjects -> LAW (Total: 1601 journals)
    - CIVIL LAW (37 journals)
    - CONSTITUTIONAL LAW (52 journals)
    - CORPORATE LAW (92 journals)
    - CRIMINAL LAW (28 journals)
    - CRIMINOLOGY AND LAW ENFORCEMENT (161 journals)
    - FAMILY AND MATRIMONIAL LAW (24 journals)
    - INTERNATIONAL LAW (194 journals)
    - JUDICIAL SYSTEMS (23 journals)
    - LAW (979 journals)
    - LAW: GENERAL (11 journals)

CRIMINAL LAW (28 journals)

Showing 1 - 28 of 28 Journals sorted alphabetically
American Criminal Law Review     Free   (Followers: 9)
American Journal of Criminal Law     Full-text available via subscription   (Followers: 12)
Anuario Iberoamericano de Derecho Internacional Penal     Open Access   (Followers: 3)
Bergen Journal of Criminal Law & Criminal Justice     Open Access   (Followers: 2)
Berkeley Journal of Criminal Law     Open Access   (Followers: 6)
Cambridge journal of evidence-based policing     Hybrid Journal   (Followers: 59)
Derecho Penal y Criminología     Open Access   (Followers: 4)
European Criminal Law Review     Full-text available via subscription   (Followers: 15)
Howard Journal of Crime and Justice The     Hybrid Journal   (Followers: 16)
Indonesian Journal of Criminal Law     Open Access   (Followers: 3)
International Journal of Digital Crime and Forensics     Full-text available via subscription   (Followers: 11)
Journal of Criminal Law     Full-text available via subscription   (Followers: 415)
Journal of Criminal Law and Criminology     Full-text available via subscription   (Followers: 51)
Justitiële verkenningen     Full-text available via subscription   (Followers: 4)
Legal and Criminological Psychology     Full-text available via subscription   (Followers: 15)
Monatsschrift für Kriminologie und Strafrechtsreform / Journal of Criminology an Penal Reform     Hybrid Journal   (Followers: 2)
Money Laundering Bulletin     Full-text available via subscription   (Followers: 8)
New Journal of European Criminal Law     Full-text available via subscription   (Followers: 8)
PROCES     Full-text available via subscription   (Followers: 2)
Psychiatry, Psychology and Law     Hybrid Journal   (Followers: 458)
Revista Eletrônica de Direito Penal e Política Criminal     Open Access   (Followers: 1)
SASI     Open Access   (Followers: 6)
Sexual Abuse A Journal of Research and Treatment     Hybrid Journal   (Followers: 44)
Strafverteidiger     Hybrid Journal   (Followers: 2)
Te Wharenga : New Zealand Criminal Law Review     Open Access   (Followers: 1)
Tidsskrift for strafferett     Full-text available via subscription   (Followers: 2)
Tijdschrift voor Criminologie     Full-text available via subscription   (Followers: 2)
Western Criminology Review     Full-text available via subscription   (Followers: 6)
Similar Journals
Journal Cover
International Journal of Digital Crime and Forensics
Journal Prestige (SJR): 0.17
Citation Impact (citeScore): 1
Number of Followers: 11  
 
  Full-text available via subscription Subscription journal
ISSN (Print) 1941-6210 - ISSN (Online) 1941-6229
Published by IGI Global Homepage  [147 journals]
  • Detection of Phishing in Internet of Things Using Machine Learning
           Approach
    • Authors: Naaz; Sameena
      Pages: 1 - 15
      Abstract: Phishing attacks are growing in the similar manner as e-commerce industries are growing. Prediction and prevention of phishing attacks is a very critical step towards safeguarding online transactions. Data mining tools can be applied in this regard as the technique is very easy and can mine millions of information within seconds and deliver accurate results. With the help of machine learning algorithms like random forest, decision tree, neural network, and linear model, we can classify data into phishing, suspicious, and legitimate. The devices that are connected over the internet, known as internet of things (IoT), are also at very high risk of phishing attack. In this work, machine learning algorithms random forest classifier, support vector machine, and logistic regression have been applied on IoT dataset for detection of phishing attacks, and then the results have been compared with previous work carried out on the same dataset as well as on a different dataset. The results of these algorithms have then been compared in terms of accuracy, error rate, precision, and recall.
      Keywords: IT Security and Ethics; Security & Forensics; Digital Crime & Forensics
      Citation: International Journal of Digital Crime and Forensics (IJDCF), Volume: 13, Issue: 2 (2021) Pages: 1-15
      PubDate: 2021-03-01T05:00:00Z
      DOI: 10.4018/IJDCF.2021030101
      Issue No: Vol. 13, No. 2 (2021)
       
  • An Audio Steganography Based on Run Length Encoding and Integer Wavelet
           Transform
    • Authors: Liu; Hanlin, Liu, Jingju, Yan, Xuehu, Xue, Pengfei, Tan, Dingwei
      Pages: 16 - 34
      Abstract: This paper proposes an audio steganography method based on run length encoding and integer wavelet transform which can be used to hide secret message in digital audio. The major contribution of the proposed scheme is to propose an audio steganography with high capacity, where the secret information is compressed by run length encoding. In the applicable scenario, the main purpose is to hide as more information as possible in the cover audio files. First, the secret information is chaotic scrambling, then the result of scrambling is run length encoded, and finally, the secret information is embedded into integer wavelet coefficients. The experimental results and comparison with existing technique show that by utilizing the lossless compression of run length encoding and anti-attack of wavelet domain, the proposed method has improved the capacity, good audio quality, and can achieve blind extraction while maintaining imperceptibility and strong robustness.
      Keywords: IT Security and Ethics; Security & Forensics; Digital Crime & Forensics
      Citation: International Journal of Digital Crime and Forensics (IJDCF), Volume: 13, Issue: 2 (2021) Pages: 16-34
      PubDate: 2021-03-01T05:00:00Z
      DOI: 10.4018/IJDCF.2021030102
      Issue No: Vol. 13, No. 2 (2021)
       
  • Fragile Watermarking Framework for Tamper Detection of Color Biometric
           Images
    • Authors: Thanki; Rohit, Borra, Surekha, Kothari, Ashish
      Pages: 35 - 56
      Abstract: Application of fragile watermarking on biometric images stored at a server or cloud ensures proper authentication and tamper detection when access to the servers was shared. In this paper, a hybrid domain fragile watermarking technique for authenticity of color biometric images, using hybridization of various transforms such as discrete cosine transform (DCT), fast discrete curvelet transform (FDCuT), and singular value decomposition (SVD) is proposed. The hybrid transform coefficients are modified according to the scrambled color watermark to obtain watermarked color biometric image. The security of this technique is strengthened with the usage of Arnold scrambling, and by using multiple secret keys. The proposed technique is analyzed on FEI Brazilian face database. The experimental results show that this technique performs better than the existing fragile watermarking techniques.
      Keywords: IT Security and Ethics; Security & Forensics; Digital Crime & Forensics
      Citation: International Journal of Digital Crime and Forensics (IJDCF), Volume: 13, Issue: 2 (2021) Pages: 35-56
      PubDate: 2021-03-01T05:00:00Z
      DOI: 10.4018/IJDCF.2021030103
      Issue No: Vol. 13, No. 2 (2021)
       
  • Automatic Generation of ROP Through Static Instructions Assignment and
           Dynamic Memory Analysis
    • Authors: Huang; Ning, Huang, Shuguang, Chang, Chao
      Pages: 57 - 76
      Abstract: W⊕X is a protection mechanism against control-flow hijacking attacks. Return-oriented programming (ROP) can perform a specific function by searching for appropriate assembly instruction fragments (gadgets) in a code segment and bypass the W⊕X. However, manual search for gadgets that match the conditions is inefficient, with high error and missing rates. In order to improve the efficiency of ROP generation, the authors propose an automatic generation method based on a fragmented layout called automatic generation of ROP. This method designs new intermediate instruction construction rules based on an automatic ROP generation framework Q, uses symbolic execution to analyze program memory states and construct data constraints for multi-modules ROP, and solves ROP data constraints to generate test cases of an ROP chain. Experiments show that this method can effectively improve the space efficiency of the ROP chain and lower the requirements of the ROP layout on memory conditions.
      Keywords: IT Security and Ethics; Security & Forensics; Digital Crime & Forensics
      Citation: International Journal of Digital Crime and Forensics (IJDCF), Volume: 13, Issue: 2 (2021) Pages: 57-76
      PubDate: 2021-03-01T05:00:00Z
      DOI: 10.4018/IJDCF.2021030104
      Issue No: Vol. 13, No. 2 (2021)
       
  • An Intrusion Detection System Using Modified-Firefly Algorithm in Cloud
           Environment
    • Authors: Ghosh; Partha, Sarkar, Dipankar, Sharma, Joy, Phadikar, Santanu
      Pages: 77 - 93
      Abstract: The present era is being dominated by cloud computing technology which provides services to the users as per demand over the internet. Satisfying the needs of huge people makes the technology prone to activities which come up as a threat. Intrusion detection system (IDS) is an effective method of providing data security to the information stored in the cloud which works by analyzing the network traffic and informs in case of any malicious activities. In order to control high amount of data stored in cloud, data is stored as per relevance leading to distributed computing. To remove redundant data, the authors have implemented data mining process such as feature selection which is used to generate an optimum subset of features from a dataset. In this paper, the proposed IDS provides security working upon the idea of feature selection. The authors have prepared a modified-firefly algorithm which acts as a proficient feature selection method and enables the NSL-KDD dataset to consume less storage space by reducing dimensions as well as less training time with greater classification accuracy.
      Keywords: IT Security and Ethics; Security & Forensics; Digital Crime & Forensics
      Citation: International Journal of Digital Crime and Forensics (IJDCF), Volume: 13, Issue: 2 (2021) Pages: 77-93
      PubDate: 2021-03-01T05:00:00Z
      DOI: 10.4018/IJDCF.2021030105
      Issue No: Vol. 13, No. 2 (2021)
       
  • Research on Threat Information Network Based on Link Prediction
    • Authors: Du; Jin, Yuan, Feng, Ding, Liping, Chen, Guangxuan, Liu, Xuehua
      Pages: 94 - 102
      Abstract: The study of complex networks is to discover the characteristics of these connections and to discover the nature of the system between them. Link prediction method is a classic in the study of complex networks. It ca not only reflect the relationship between the node similarity. More can be estimated through the edge, which reveals the intrinsic factors of network evolution, namely the network evolution mechanism. Threat information network is the evolution and development of the network. The introduction of such a complex network of interdisciplinary approach is an innovative research perspective to observe that the threat intelligence occurs. The characteristics of the network show, at the same time, also can predict what will happen. The evolution of the network for network security situational awareness of the research provides a new approach.
      Keywords: IT Security and Ethics; Security & Forensics; Digital Crime & Forensics
      Citation: International Journal of Digital Crime and Forensics (IJDCF), Volume: 13, Issue: 2 (2021) Pages: 94-102
      PubDate: 2021-03-01T05:00:00Z
      DOI: 10.4018/IJDCF.2021030106
      Issue No: Vol. 13, No. 2 (2021)
       
  • Multiple Fusion Strategies in Localization of Local Deformation Tampering
    • Authors: Ke; Yongzhen, Cui, Yiping
      Pages: 103 - 114
      Abstract: Tampering with images may involve the field of crime and also bring problems such as incorrect values to the public. Image local deformation is one of the most common image tampering methods, where the original texture features and the correlation between the pixels of an image are changed. Multiple fusion strategies based on first-order difference images and their texture feature is proposed to locate the tamper in local deformation image. Firstly, texture features using overlapping blocks on one color channel are extracted and fed into fuzzy c-means clustering method to generate a tamper probability map (TPM), and then several TPMs with different block sizes are fused in the first fusion. Secondly, different TPMs with different color channels and different texture features are respectively fused in the second and third fusion. The experimental results show that the proposed method can accurately detect the location of the local deformation of an image.
      Keywords: IT Security and Ethics; Security & Forensics; Digital Crime & Forensics
      Citation: International Journal of Digital Crime and Forensics (IJDCF), Volume: 13, Issue: 2 (2021) Pages: 103-114
      PubDate: 2021-03-01T05:00:00Z
      DOI: 10.4018/IJDCF.2021030107
      Issue No: Vol. 13, No. 2 (2021)
       
  • Design a Wireless Covert Channel Based on Dither Analog Chaotic Code
    • Authors: Cao; Pengcheng, Liu, Weiwei, Liu, Guangjie, Zhai, Jiangtao, Ji, Xiao-Peng, Dai, Yuewei, Bai, Huiwen
      Pages: 115 - 133
      Abstract: To conceal the very existence of communication, the noise-based wireless covert channel modulates secret messages into artificial noise, which is added to the normal wireless signal. Although the state-of-the-art work based on constellation modulation has made the composite and legitimate signal undistinguishable, there exists an imperfection on reliability due to the dense distribution of covert constellation points. In this study, the authors design a wireless covert channel based on dither analog chaotic code to improve the reliability without damaging the undetectability. The dither analog chaotic code (DACC) plays the role as the error correcting code. In the modulation, the analog variables converted from secret messages are encode into joint codewords by chaotic mapping and dither derivation of DACC. The joint codewords are mapped to artificial noise later. Simulation results show that the proposed scheme can achieve better reliability than the state-of-the-art scheme while maintaining the similar performance on undetectability.
      Keywords: IT Security and Ethics; Security & Forensics; Digital Crime & Forensics
      Citation: International Journal of Digital Crime and Forensics (IJDCF), Volume: 13, Issue: 2 (2021) Pages: 115-133
      PubDate: 2021-03-01T05:00:00Z
      DOI: 10.4018/IJDCF.2021030108
      Issue No: Vol. 13, No. 2 (2021)
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 100.24.122.117
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-