Subjects -> LAW (Total: 1397 journals)
    - CIVIL LAW (30 journals)
    - CONSTITUTIONAL LAW (52 journals)
    - CORPORATE LAW (65 journals)
    - CRIMINAL LAW (28 journals)
    - CRIMINOLOGY AND LAW ENFORCEMENT (161 journals)
    - FAMILY AND MATRIMONIAL LAW (23 journals)
    - INTERNATIONAL LAW (161 journals)
    - JUDICIAL SYSTEMS (23 journals)
    - LAW (843 journals)
    - LAW: GENERAL (11 journals)

CRIMINAL LAW (28 journals)

Showing 1 - 22 of 22 Journals sorted by number of followers
Psychiatry, Psychology and Law     Hybrid Journal   (Followers: 386)
Journal of Criminal Law     Full-text available via subscription   (Followers: 298)
Cambridge journal of evidence-based policing     Hybrid Journal   (Followers: 61)
Sexual Abuse A Journal of Research and Treatment     Hybrid Journal   (Followers: 48)
Journal of Criminal Law and Criminology     Full-text available via subscription   (Followers: 45)
Howard Journal of Crime and Justice The     Hybrid Journal   (Followers: 22)
Legal and Criminological Psychology     Full-text available via subscription   (Followers: 15)
International Journal of Digital Crime and Forensics     Full-text available via subscription   (Followers: 13)
European Criminal Law Review     Full-text available via subscription   (Followers: 12)
American Journal of Criminal Law     Full-text available via subscription   (Followers: 10)
Money Laundering Bulletin     Full-text available via subscription   (Followers: 9)
SASI     Open Access   (Followers: 8)
Berkeley Journal of Criminal Law     Open Access   (Followers: 6)
Justitiële verkenningen     Full-text available via subscription   (Followers: 5)
New Journal of European Criminal Law     Full-text available via subscription   (Followers: 5)
Tijdschrift voor Criminologie     Full-text available via subscription   (Followers: 3)
PROCES     Full-text available via subscription   (Followers: 3)
Anuario Iberoamericano de Derecho Internacional Penal     Open Access   (Followers: 2)
Derecho Penal y Criminología     Open Access   (Followers: 2)
Tidsskrift for strafferett     Full-text available via subscription   (Followers: 2)
Indonesian Journal of Criminal Law     Open Access   (Followers: 2)
Bergen Journal of Criminal Law & Criminal Justice     Open Access   (Followers: 1)
Similar Journals
Journal Cover
International Journal of Digital Crime and Forensics
Journal Prestige (SJR): 0.17
Citation Impact (citeScore): 1
Number of Followers: 13  
 
  Full-text available via subscription Subscription journal
ISSN (Print) 1941-6210 - ISSN (Online) 1941-6229
Published by IGI Global Homepage  [146 journals]
  • MD-S3C3

    • Free pre-print version: Loading...

      Authors: Pan; Heng, Zhang, Yaoyao, Liu, Jianmei, Si, Xueming, Yao, Zhongyuan, Zhao, Liang
      Pages: 1 - 24
      Abstract: In medical data sharing, the data access control authorities of the sharing entities and computing capabilities of the sharing platforms are asymmetric. This asymmetry leads to poor patient control over their data, privacy disclosure, and difficulties in tracking data sharing. This aarticle proposes a cooperation model of cloud and chain (CMCC) for the secure sharing of medical data. In the CMCC, the power equivalence of blockchain nodes limits the control authority asymmetry between doctors and patients in medical data sharing. Moreover, a cloud server is used to store medical data, and some of the node-side computations are handed over to the cloud, which addresses the asymmetric computing capability asymmetry between the cloud and ordinary nodes. Based on the CMCC, a secure medical data sharing scheme based on proxy re-encryption mechanism is proposed. This scheme realizes secure medical data sharing, especially the patient's complete control of the data. The security and performance analysis show that the proposed scheme outperforms the existing ones.
      Keywords: IT Security and Ethics; Security & Forensics; Digital Crime & Forensics
      Citation: International Journal of Digital Crime and Forensics (IJDCF), Volume: 15, Issue: 1 (2023) Pages: 1-24
      PubDate: 2023-01-01T05:00:00Z
      DOI: 10.4018/IJDCF.329219
      Issue No: Vol. 15, No. 1 (2023)
       
  • A Crime Scene Reconstruction for Digital Forensic Analysis

    • Free pre-print version: Loading...

      Authors: Nicho; Mathew, Alblooki, Maha, AlMutiwei, Saeed, McDermott, Christopher D., Ilesanmi, Olufemi
      Pages: 1 - 20
      Abstract: The abundance of digital data within modern vehicles makes digital vehicle forensics (DVF) a promising subfield of digital forensics (DF), with significant potential for investigations. In this research, the authors apply DVF methodology to a SUV, simulating a real case by extracting and analyzing the data in the period leading up to an incident to evaluate the effectiveness of DVF in solving crime. The authors employ DVF approach to extract data to reveal evidential information for judicial evaluation and verdict. This data helped determine whether the incident represented an accident or an act of crime. This simulated case and the assumptions supported by the DVF evidence provides a compelling example of how law enforcement agencies can leverage DVF to collect and present evidence to relevant authorities. This form of forensics can assist government in planning for and regulating the deployment of DVF data, the judiciary in assessing the nature and admissibility of evidence, and vehicle manufacturers in complying with the regulations relating to the harvesting and retrieval of data.
      Keywords: IT Security and Ethics; Security & Forensics; Digital Crime & Forensics
      Citation: International Journal of Digital Crime and Forensics (IJDCF), Volume: 15, Issue: 1 (2023) Pages: 1-20
      PubDate: 2023-01-01T05:00:00Z
      DOI: 10.4018/IJDCF.327358
      Issue No: Vol. 15, No. 1 (2023)
       
  • Abnormality Retrieval Method of Laboratory Surveillance Video Based on
           Deep Automatic Encoder

    • Free pre-print version: Loading...

      Authors: Zhang; Dawei
      Pages: 1 - 14
      Abstract: Aiming at the problem that abnormal behavior is difficult to distinguish from normal behavior, a retrieval method for abnormal behavior of laboratory security surveillance video based on deep automatic encoder is proposed. Firstly, the fuzzy median filtering algorithm is used to reduce the noise of the collected laboratory security surveillance video, and then the YUV spatial chromaticity difference method is used to divide the foreground and background of the video, and the illumination degree in the video is determined. The diagonal model and codebook clustering idea are used to compensate for global and local lighting mutations. Finally, the preprocessed video is input into the mixture model, which is based on the deep automatic encoder and combined with the Gaussian mixture model, and the abnormal behavior retrieval results are output. The experimental results show that the proposed method has good security surveillance video preprocessing effect, large AUC, small error rate of abnormal behavior retrieval, and high operation efficiency.
      Keywords: IT Security and Ethics; Security & Forensics; Digital Crime & Forensics
      Citation: International Journal of Digital Crime and Forensics (IJDCF), Volume: 15, Issue: 1 (2023) Pages: 1-14
      PubDate: 2023-01-01T05:00:00Z
      DOI: 10.4018/IJDCF.325224
      Issue No: Vol. 15, No. 1 (2023)
       
  • The Metric for Automatic Code Generation Based on Dynamic Abstract Syntax
           Tree

    • Free pre-print version: Loading...

      Authors: Yao; Wenjun, Jiang, Ying, Yang, Yang
      Pages: 1 - 20
      Abstract: In order to improve the efficiency and quality of software development, automatic code generation technology is the current focus. The quality of the code generated by the automatic code generation technology is also an important issue. However, existing metrics for code automatic generation ignore that the programming process is a continuous dynamic changeable process. So the metric is a dynamic process. This article proposes a metric method based on dynamic abstract syntax tree (DAST). More specifically, the method first builds a DAST through the interaction in behavior information between the automatic code generation tool and programmer. Then the measurement contents are extracted on the DAST. Finally, the metric is completed with contents extracted. The experiment results show that the method can effectively realize the metrics of automatic code generation. Compared with the MAST method, the method in this article can improve the convergence speed by 80% when training the model, and can shorten the time-consuming by an average of 46% when doing the metric prediction.
      Keywords: IT Security and Ethics; Security & Forensics; Digital Crime & Forensics
      Citation: International Journal of Digital Crime and Forensics (IJDCF), Volume: 15, Issue: 1 (2023) Pages: 1-20
      PubDate: 2023-01-01T05:00:00Z
      DOI: 10.4018/IJDCF.325062
      Issue No: Vol. 15, No. 1 (2023)
       
  • Latest Trends in Deep Learning Techniques for Image Steganography

    • Free pre-print version: Loading...

      Authors: Kumar; Vijay, Sharma, Sahil, Kumar, Chandan, Sahu, Aditya Kumar
      Pages: 1 - 14
      Abstract: The development of deep convolutional neural networks has been largely responsible for the significant strides forward made in steganography over the past decade. In the field of image steganography, generative adversarial networks (GAN) are becoming increasingly popular. This study describes current development in image steganographic systems based on deep learning. The authors' goal is to lay out the various works that have been done in image steganography using deep learning techniques and provide some notes on the various methods. This study proposed a result that could open up some new avenues for future research in deep learning based on image steganographic methods. These new avenues could be explored in the future. Moreover, the pros and cons of current methods are laid out with several promising directions to define problems that researchers can work on in future research avenues.
      Keywords: IT Security and Ethics; Security & Forensics; Digital Crime & Forensics
      Citation: International Journal of Digital Crime and Forensics (IJDCF), Volume: 15, Issue: 1 (2023) Pages: 1-14
      PubDate: 2023-01-01T05:00:00Z
      DOI: 10.4018/IJDCF.318666
      Issue No: Vol. 15, No. 1 (2023)
       
  • Key Node Identification Based on Vulnerability Life Cycle and the
           Importance of Network Topology

    • Free pre-print version: Loading...

      Authors: Zhu; Yuwen, Yu, Lei
      Pages: 1 - 16
      Abstract: The key network node identification technology plays an important role in comprehending unknown terrains and rapid action planning in network attack and defense confrontation. The conventional key node identification algorithm only takes one type of relationship into consideration; therefore, it is incapable of representing the characteristics of multiple relationships between nodes. Additionally, it typically disregards the periodic change law of network node vulnerability over time. In order to solve the above problems, this paper proposes a network key node identification method based on the vulnerability life cycle and the significance of the network topology. Based on the CVSS score, this paper proposes the calculation method of the vulnerability life cycle risk value, and identifies the key nodes of the network based on the importance of the network topology. Finally, it demonstrates the effectiveness of the method in the selection of key nodes through network instance analysis.
      Keywords: IT Security and Ethics; Security & Forensics; Digital Crime & Forensics
      Citation: International Journal of Digital Crime and Forensics (IJDCF), Volume: 15, Issue: 1 (2023) Pages: 1-16
      PubDate: 2023-01-01T05:00:00Z
      DOI: 10.4018/IJDCF.317100
      Issue No: Vol. 15, No. 1 (2023)
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 18.206.194.21
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-