Example of International Journal of Electronic Security and Digital Forensics format
Recent searches

Example of International Journal of Electronic Security and Digital Forensics format Example of International Journal of Electronic Security and Digital Forensics format Example of International Journal of Electronic Security and Digital Forensics format Example of International Journal of Electronic Security and Digital Forensics format Example of International Journal of Electronic Security and Digital Forensics format Example of International Journal of Electronic Security and Digital Forensics format Example of International Journal of Electronic Security and Digital Forensics format Example of International Journal of Electronic Security and Digital Forensics format
Sample paper formatted on SciSpace - SciSpace
This content is only for preview purposes. The original open access content can be found here.
Look Inside
Example of International Journal of Electronic Security and Digital Forensics format Example of International Journal of Electronic Security and Digital Forensics format Example of International Journal of Electronic Security and Digital Forensics format Example of International Journal of Electronic Security and Digital Forensics format Example of International Journal of Electronic Security and Digital Forensics format Example of International Journal of Electronic Security and Digital Forensics format Example of International Journal of Electronic Security and Digital Forensics format Example of International Journal of Electronic Security and Digital Forensics format
Sample paper formatted on SciSpace - SciSpace
This content is only for preview purposes. The original open access content can be found here.
open access Open Access

International Journal of Electronic Security and Digital Forensics — Template for authors

Categories Rank Trend in last 3 yrs
Law #109 of 722 up up by 173 ranks
Safety, Risk, Reliability and Quality #77 of 165 up up by 26 ranks
Computer Networks and Communications #179 of 334 up up by 32 ranks
journal-quality-icon Journal quality:
High
calendar-icon Last 4 years overview: 97 Published Papers | 218 Citations
indexed-in-icon Indexed in: Scopus
last-updated-icon Last updated: 13/07/2020
Related journals
Insights
General info
Top papers
Popular templates
Get started guide
Why choose from SciSpace
FAQ

Related Journals

open access Open Access

Elsevier

Quality:  
High
CiteRatio: 5.7
SJR: 0.61
SNIP: 1.727
open access Open Access
recommended Recommended

IEEE

Quality:  
High
CiteRatio: 15.1
SJR: 1.613
SNIP: 3.373
open access Open Access

Inderscience Publishers

Quality:  
Medium
CiteRatio: 0.9
SJR: 0.153
SNIP: 0.532
open access Open Access
recommended Recommended

Taylor and Francis

Quality:  
High
CiteRatio: 6.3
SJR: 2.156
SNIP: 2.402

Journal Performance & Insights

CiteRatio

SCImago Journal Rank (SJR)

Source Normalized Impact per Paper (SNIP)

A measure of average citations received per peer-reviewed paper published in the journal.

Measures weighted citations received by the journal. Citation weighting depends on the categories and prestige of the citing journal.

Measures actual citations received relative to citations expected for the journal's category.

2.2

8% from 2019

CiteRatio for International Journal of Electronic Security and Digital Forensics from 2016 - 2020
Year Value
2020 2.2
2019 2.4
2018 0.8
2017 0.8
2016 0.9
graph view Graph view
table view Table view

0.177

12% from 2019

SJR for International Journal of Electronic Security and Digital Forensics from 2016 - 2020
Year Value
2020 0.177
2019 0.201
2018 0.135
2017 0.137
2016 0.187
graph view Graph view
table view Table view

0.562

27% from 2019

SNIP for International Journal of Electronic Security and Digital Forensics from 2016 - 2020
Year Value
2020 0.562
2019 0.775
2018 0.333
2017 0.249
2016 0.424
graph view Graph view
table view Table view

insights Insights

  • CiteRatio of this journal has decreased by 8% in last years.
  • This journal’s CiteRatio is in the top 10 percentile category.

insights Insights

  • SJR of this journal has decreased by 12% in last years.
  • This journal’s SJR is in the top 10 percentile category.

insights Insights

  • SNIP of this journal has decreased by 27% in last years.
  • This journal’s SNIP is in the top 10 percentile category.

International Journal of Electronic Security and Digital Forensics

Guideline source: View

All company, product and service names used in this website are for identification purposes only. All product names, trademarks and registered trademarks are property of their respective owners.

Use of these names, trademarks and brands does not imply endorsement or affiliation. Disclaimer Notice

Inderscience Publishers

International Journal of Electronic Security and Digital Forensics

IJESDF aims to establish dialogue in an ideal and unique setting for researchers and practitioners to have a knowledge resource, report and publish scholarly articles and engage in debate on various security related issues, new developments and latest proven methodologies in t...... Read More

i
Last updated on
13 Jul 2020
i
ISSN
1751-911X
i
Impact Factor
Medium - 0.817
i
Open Access
No
i
Sherpa RoMEO Archiving Policy
Yellow faq
i
Plagiarism Check
Available via Turnitin
i
Endnote Style
Download Available
i
Bibliography Name
plainnat
i
Citation Type
Author Year
(Blonder et al., 1982)
i
Bibliography Example
Beenakker, C. W. J. (2006). ‘Specular Andreev Reflection in Graphene’. Phys. Rev. Lett., Vol 97, No 6, pp. 067007.

Top papers written in this journal

Journal Article DOI: 10.1504/IJESDF.2007.016865
Opcodes as predictor for malware
Daniel Bilar1

Abstract:

This paper discusses a detection mechanism for malicious code through statistical analysis of opcode distributions A total of 67 malware executables were sampled statically disassembled and their statistical opcode frequency distribution compared with the aggregate statistics of 20 non-malicious samples We find that malware o... This paper discusses a detection mechanism for malicious code through statistical analysis of opcode distributions A total of 67 malware executables were sampled statically disassembled and their statistical opcode frequency distribution compared with the aggregate statistics of 20 non-malicious samples We find that malware opcode distributions differ statistically significantly from non-malicious software Furthermore, rare opcodes seem to be a stronger predictor, explaining 12 63% of frequency variation read more read less

Topics:

Opcode (61%)61% related to the paper, Malware (52%)52% related to the paper
281 Citations
open accessOpen access Journal Article DOI: 10.1504/IJESDF.2007.013589
Integrating security and usability into the requirements and design process
Ivan Flechais1, Cecilia Mascolo2, M. Angela Sasse2

Abstract:

According to Ross Anderson, 'Many systems fail because their designers protect the wrong things or protect the right things in the wrong way'. Surveys also show that security incidents in industry are rising, which highlights the difficulty of designing good security. Some recent approaches have targeted security from the tec... According to Ross Anderson, 'Many systems fail because their designers protect the wrong things or protect the right things in the wrong way'. Surveys also show that security incidents in industry are rising, which highlights the difficulty of designing good security. Some recent approaches have targeted security from the technological perspective, others from the human computer interaction angle, offering better User Interfaces (UIs) for improved usability of security mechanisms. However, usability issues also extend beyond the user interface and should be considered during system requirements and design. In this paper, we describe Appropriate and Effective Guidance for Information Security (AEGIS), a methodology for the development of secure and usable systems. AEGIS defines a development process and a UML meta-model of the definition and the reasoning over the system's assets. AEGIS has been applied to case studies in the area of Grid computing and we report on one of these. read more read less

Topics:

Human-computer interaction in information security (67%)67% related to the paper, Security testing (64%)64% related to the paper, Computer security model (63%)63% related to the paper, Security through obscurity (62%)62% related to the paper, Cloud computing security (62%)62% related to the paper
View PDF
98 Citations
Journal Article DOI: 10.1504/IJESDF.2008.020946
Radio frequency fingerprinting commercial communication devices to enhance electronic security
William Suski1, Michael A. Temple1, Michael J. Mendenhall1, Robert F. Mills1

Abstract:

There is a current shift toward protecting against unauthorised network access at the open systems interconnection physical layer by exploiting radio frequency characteristics that are difficult to mimic. This work addresses the use of RF 'fingerprints' to uniquely identify emissions from commercial devices. The goal is to ex... There is a current shift toward protecting against unauthorised network access at the open systems interconnection physical layer by exploiting radio frequency characteristics that are difficult to mimic. This work addresses the use of RF 'fingerprints' to uniquely identify emissions from commercial devices. The goal is to exploit inherent signal features using a four step process that includes: 1. feature generation, 2. transient detection, 3. fingerprint extraction and 4. classification. Reliable transient detection is perhaps the most important step and is addressed here using a variance trajectory approach. Following transient detection, two fingerprinting and classification methods are considered, including 1. power spectral density (PSD) fingerprints with spectral correlation and 2. statistical fingerprints with multiple discriminant analysis-maximum likelihood (MDA-ML) classification. Each of these methods is evaluated using the 802.11a orthogonal frequency-division multiplexing (OFDM) signal. For minimal transient detection error, results show that amplitude-based detection is most effective for 802.11a OFDM signals. It is shown that MDA-ML classification provides approximately 8.5-9.0% better classification performance than spectral correlation over a range of analysis signal-to-noise ratios (SNRA) using three hardware devices from two manufacturers. Overall, greater than 80% classification accuracy is achieved for spectral correlation at SNRA > 6 dB and for MDA-ML classification at SNRA > -3 dB. read more read less

Topics:

Fingerprint (computing) (51%)51% related to the paper, Orthogonal frequency-division multiplexing (50%)50% related to the paper, Multiplexing (50%)50% related to the paper
78 Citations
Journal Article DOI: 10.1504/IJESDF.2010.032330
Improved wireless security for GMSK-based devices using RF fingerprinting
Donald R. Reising1, Michael A. Temple1, Michael J. Mendenhall1

Abstract:

Gaussian minimum shift keying (GMSK) is employed in current global system for mobile (GSM) networks and remains a viable option for future wireless systems. Physical layer (PHY) security is demonstrated using RF fingerprints from GSM-GMSK signals to thwart malicious activities that are commonly orchestrated through unauthoris... Gaussian minimum shift keying (GMSK) is employed in current global system for mobile (GSM) networks and remains a viable option for future wireless systems. Physical layer (PHY) security is demonstrated using RF fingerprints from GSM-GMSK signals to thwart malicious activities that are commonly orchestrated through unauthorised use of digital identities. Enhanced security is provided through specific emitter identification by classifying RF fingerprints from near-transient and midamble regions of GSM-GMSK bursts using multiple discriminant analysis with maximum likelihood estimation (MDA/ML). While midamble classification performance using instantaneous phase responses is notable, results using GSM-MSK near-transient fingerprint features are nearly 12% better at SNR = 20 dB and accuracies of 88–94% are achieved at SNR = 6 dB. While transient feature performance is consistent with previous 802.11a results, midamble performance is poorer and various factors are identified as potential contributors to the increased classification challenge posed by GMSK signals. read more read less

Topics:

Minimum-shift keying (53%)53% related to the paper
74 Citations
open accessOpen access Journal Article DOI: 10.1504/IJESDF.2007.013592
A machine learning approach to keystroke dynamics based user authentication

Abstract:

The majority of computer systems employ a login ID and password as the principal method for access security. In stand-alone situations, this level of security may be adequate, but when computers are connected to the internet, the vulnerability to a security breach is increased. In order to reduce vulnerability to attack, biom... The majority of computer systems employ a login ID and password as the principal method for access security. In stand-alone situations, this level of security may be adequate, but when computers are connected to the internet, the vulnerability to a security breach is increased. In order to reduce vulnerability to attack, biometric solutions have been employed. In this paper, we investigate the use of a behavioural biometric based on keystroke dynamics. Although there are several implementations of keystroke dynamics available, their effectiveness is variable and dependent on the data sample and its acquisition methodology. The results from this study indicate that the Equal Error Rate (EER) is significantly influenced by the attribute selection process and to a lesser extent on the authentication algorithm employed. Our results also provide evidence that a Probabilistic Neural Network (PNN) can be superior in terms of reduced training time and classification accuracy when compared with a typical MLFN back-propagation trained neural network. read more read less

Topics:

Keystroke dynamics (65%)65% related to the paper, Vulnerability (computing) (55%)55% related to the paper, Probabilistic neural network (54%)54% related to the paper, Password (54%)54% related to the paper, Access control (53%)53% related to the paper
View PDF
70 Citations
Author Pic

SciSpace is a very innovative solution to the formatting problem and existing providers, such as Mendeley or Word did not really evolve in recent years.

- Andreas Frutiger, Researcher, ETH Zurich, Institute for Biomedical Engineering

Get MS-Word and LaTeX output to any Journal within seconds
1
Choose a template
Select a template from a library of 40,000+ templates
2
Import a MS-Word file or start fresh
It takes only few seconds to import
3
View and edit your final output
SciSpace will automatically format your output to meet journal guidelines
4
Submit directly or Download
Submit to journal directly or Download in PDF, MS Word or LaTeX

(Before submission check for plagiarism via Turnitin)

clock Less than 3 minutes

What to expect from SciSpace?

Speed and accuracy over MS Word

''

With SciSpace, you do not need a word template for International Journal of Electronic Security and Digital Forensics.

It automatically formats your research paper to Inderscience Publishers formatting guidelines and citation style.

You can download a submission ready research paper in pdf, LaTeX and docx formats.

Time comparison

Time taken to format a paper and Compliance with guidelines

Plagiarism Reports via Turnitin

SciSpace has partnered with Turnitin, the leading provider of Plagiarism Check software.

Using this service, researchers can compare submissions against more than 170 million scholarly articles, a database of 70+ billion current and archived web pages. How Turnitin Integration works?

Turnitin Stats
Publisher Logos

Freedom from formatting guidelines

One editor, 100K journal formats – world's largest collection of journal templates

With such a huge verified library, what you need is already there.

publisher-logos

Easy support from all your favorite tools

International Journal of Electronic Security and Digital Forensics format uses plainnat citation style.

Automatically format and order your citations and bibliography in a click.

SciSpace allows imports from all reference managers like Mendeley, Zotero, Endnote, Google Scholar etc.

Frequently asked questions

1. Can I write International Journal of Electronic Security and Digital Forensics in LaTeX?

Absolutely not! Our tool has been designed to help you focus on writing. You can write your entire paper as per the International Journal of Electronic Security and Digital Forensics guidelines and auto format it.

2. Do you follow the International Journal of Electronic Security and Digital Forensics guidelines?

Yes, the template is compliant with the International Journal of Electronic Security and Digital Forensics guidelines. Our experts at SciSpace ensure that. If there are any changes to the journal's guidelines, we'll change our algorithm accordingly.

3. Can I cite my article in multiple styles in International Journal of Electronic Security and Digital Forensics?

Of course! We support all the top citation styles, such as APA style, MLA style, Vancouver style, Harvard style, and Chicago style. For example, when you write your paper and hit autoformat, our system will automatically update your article as per the International Journal of Electronic Security and Digital Forensics citation style.

4. Can I use the International Journal of Electronic Security and Digital Forensics templates for free?

Sign up for our free trial, and you'll be able to use all our features for seven days. You'll see how helpful they are and how inexpensive they are compared to other options, Especially for International Journal of Electronic Security and Digital Forensics.

5. Can I use a manuscript in International Journal of Electronic Security and Digital Forensics that I have written in MS Word?

Yes. You can choose the right template, copy-paste the contents from the word document, and click on auto-format. Once you're done, you'll have a publish-ready paper International Journal of Electronic Security and Digital Forensics that you can download at the end.

6. How long does it usually take you to format my papers in International Journal of Electronic Security and Digital Forensics?

It only takes a matter of seconds to edit your manuscript. Besides that, our intuitive editor saves you from writing and formatting it in International Journal of Electronic Security and Digital Forensics.

7. Where can I find the template for the International Journal of Electronic Security and Digital Forensics?

It is possible to find the Word template for any journal on Google. However, why use a template when you can write your entire manuscript on SciSpace , auto format it as per International Journal of Electronic Security and Digital Forensics's guidelines and download the same in Word, PDF and LaTeX formats? Give us a try!.

8. Can I reformat my paper to fit the International Journal of Electronic Security and Digital Forensics's guidelines?

Of course! You can do this using our intuitive editor. It's very easy. If you need help, our support team is always ready to assist you.

9. International Journal of Electronic Security and Digital Forensics an online tool or is there a desktop version?

SciSpace's International Journal of Electronic Security and Digital Forensics is currently available as an online tool. We're developing a desktop version, too. You can request (or upvote) any features that you think would be helpful for you and other researchers in the "feature request" section of your account once you've signed up with us.

10. I cannot find my template in your gallery. Can you create it for me like International Journal of Electronic Security and Digital Forensics?

Sure. You can request any template and we'll have it setup within a few days. You can find the request box in Journal Gallery on the right side bar under the heading, "Couldn't find the format you were looking for like International Journal of Electronic Security and Digital Forensics?”

11. What is the output that I would get after using International Journal of Electronic Security and Digital Forensics?

After writing your paper autoformatting in International Journal of Electronic Security and Digital Forensics, you can download it in multiple formats, viz., PDF, Docx, and LaTeX.

12. Is International Journal of Electronic Security and Digital Forensics's impact factor high enough that I should try publishing my article there?

To be honest, the answer is no. The impact factor is one of the many elements that determine the quality of a journal. Few of these factors include review board, rejection rates, frequency of inclusion in indexes, and Eigenfactor. You need to assess all these factors before you make your final call.

13. What is Sherpa RoMEO Archiving Policy for International Journal of Electronic Security and Digital Forensics?

SHERPA/RoMEO Database

We extracted this data from Sherpa Romeo to help researchers understand the access level of this journal in accordance with the Sherpa Romeo Archiving Policy for International Journal of Electronic Security and Digital Forensics. The table below indicates the level of access a journal has as per Sherpa Romeo's archiving policy.

RoMEO Colour Archiving policy
Green Can archive pre-print and post-print or publisher's version/PDF
Blue Can archive post-print (ie final draft post-refereeing) or publisher's version/PDF
Yellow Can archive pre-print (ie pre-refereeing)
White Archiving not formally supported
FYI:
  1. Pre-prints as being the version of the paper before peer review and
  2. Post-prints as being the version of the paper after peer-review, with revisions having been made.

14. What are the most common citation types In International Journal of Electronic Security and Digital Forensics?

The 5 most common citation types in order of usage for International Journal of Electronic Security and Digital Forensics are:.

S. No. Citation Style Type
1. Author Year
2. Numbered
3. Numbered (Superscripted)
4. Author Year (Cited Pages)
5. Footnote

15. How do I submit my article to the International Journal of Electronic Security and Digital Forensics?

It is possible to find the Word template for any journal on Google. However, why use a template when you can write your entire manuscript on SciSpace , auto format it as per International Journal of Electronic Security and Digital Forensics's guidelines and download the same in Word, PDF and LaTeX formats? Give us a try!.

16. Can I download International Journal of Electronic Security and Digital Forensics in Endnote format?

Yes, SciSpace provides this functionality. After signing up, you would need to import your existing references from Word or Bib file to SciSpace. Then SciSpace would allow you to download your references in International Journal of Electronic Security and Digital Forensics Endnote style according to Elsevier guidelines.

Fast and reliable,
built for complaince.

Instant formatting to 100% publisher guidelines on - SciSpace.

Available only on desktops 🖥

No word template required

Typset automatically formats your research paper to International Journal of Electronic Security and Digital Forensics formatting guidelines and citation style.

Verifed journal formats

One editor, 100K journal formats.
With the largest collection of verified journal formats, what you need is already there.

Trusted by academicians

I spent hours with MS word for reformatting. It was frustrating - plain and simple. With SciSpace, I can draft my manuscripts and once it is finished I can just submit. In case, I have to submit to another journal it is really just a button click instead of an afternoon of reformatting.

Andreas Frutiger
Researcher & Ex MS Word user
Use this template