Published: Jan 20, 2023
Converted to Gold OA:
DOI: 10.4018/IJDCF.317100
Volume 15
Yuwen Zhu, Lei Yu
The key network node identification technology plays an important role in comprehending unknown terrains and rapid action planning in network attack and defense confrontation. The conventional key...
Show More
The key network node identification technology plays an important role in comprehending unknown terrains and rapid action planning in network attack and defense confrontation. The conventional key node identification algorithm only takes one type of relationship into consideration; therefore, it is incapable of representing the characteristics of multiple relationships between nodes. Additionally, it typically disregards the periodic change law of network node vulnerability over time. In order to solve the above problems, this paper proposes a network key node identification method based on the vulnerability life cycle and the significance of the network topology. Based on the CVSS score, this paper proposes the calculation method of the vulnerability life cycle risk value, and identifies the key nodes of the network based on the importance of the network topology. Finally, it demonstrates the effectiveness of the method in the selection of key nodes through network instance analysis.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Zhu, Yuwen, and Lei Yu. "Key Node Identification Based on Vulnerability Life Cycle and the Importance of Network Topology." IJDCF vol.15, no.1 2023: pp.1-16. http://doi.org/10.4018/IJDCF.317100
APA
Zhu, Y. & Yu, L. (2023). Key Node Identification Based on Vulnerability Life Cycle and the Importance of Network Topology. International Journal of Digital Crime and Forensics (IJDCF), 15(1), 1-16. http://doi.org/10.4018/IJDCF.317100
Chicago
Zhu, Yuwen, and Lei Yu. "Key Node Identification Based on Vulnerability Life Cycle and the Importance of Network Topology," International Journal of Digital Crime and Forensics (IJDCF) 15, no.1: 1-16. http://doi.org/10.4018/IJDCF.317100
Export Reference

Published: Feb 24, 2023
Converted to Gold OA:
DOI: 10.4018/IJDCF.318666
Volume 15
Vijay Kumar, Sahil Sharma, Chandan Kumar, Aditya Kumar Sahu
The development of deep convolutional neural networks has been largely responsible for the significant strides forward made in steganography over the past decade. In the field of image...
Show More
The development of deep convolutional neural networks has been largely responsible for the significant strides forward made in steganography over the past decade. In the field of image steganography, generative adversarial networks (GAN) are becoming increasingly popular. This study describes current development in image steganographic systems based on deep learning. The authors' goal is to lay out the various works that have been done in image steganography using deep learning techniques and provide some notes on the various methods. This study proposed a result that could open up some new avenues for future research in deep learning based on image steganographic methods. These new avenues could be explored in the future. Moreover, the pros and cons of current methods are laid out with several promising directions to define problems that researchers can work on in future research avenues.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Kumar, Vijay, et al. "Latest Trends in Deep Learning Techniques for Image Steganography." IJDCF vol.15, no.1 2023: pp.1-14. http://doi.org/10.4018/IJDCF.318666
APA
Kumar, V., Sharma, S., Kumar, C., & Sahu, A. K. (2023). Latest Trends in Deep Learning Techniques for Image Steganography. International Journal of Digital Crime and Forensics (IJDCF), 15(1), 1-14. http://doi.org/10.4018/IJDCF.318666
Chicago
Kumar, Vijay, et al. "Latest Trends in Deep Learning Techniques for Image Steganography," International Journal of Digital Crime and Forensics (IJDCF) 15, no.1: 1-14. http://doi.org/10.4018/IJDCF.318666
Export Reference

Published: Jun 27, 2023
Converted to Gold OA:
DOI: 10.4018/IJDCF.325062
Volume 15
Wenjun Yao, Ying Jiang, Yang Yang
In order to improve the efficiency and quality of software development, automatic code generation technology is the current focus. The quality of the code generated by the automatic code generation...
Show More
In order to improve the efficiency and quality of software development, automatic code generation technology is the current focus. The quality of the code generated by the automatic code generation technology is also an important issue. However, existing metrics for code automatic generation ignore that the programming process is a continuous dynamic changeable process. So the metric is a dynamic process. This article proposes a metric method based on dynamic abstract syntax tree (DAST). More specifically, the method first builds a DAST through the interaction in behavior information between the automatic code generation tool and programmer. Then the measurement contents are extracted on the DAST. Finally, the metric is completed with contents extracted. The experiment results show that the method can effectively realize the metrics of automatic code generation. Compared with the MAST method, the method in this article can improve the convergence speed by 80% when training the model, and can shorten the time-consuming by an average of 46% when doing the metric prediction.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Yao, Wenjun, et al. "The Metric for Automatic Code Generation Based on Dynamic Abstract Syntax Tree." IJDCF vol.15, no.1 2023: pp.1-20. http://doi.org/10.4018/IJDCF.325062
APA
Yao, W., Jiang, Y., & Yang, Y. (2023). The Metric for Automatic Code Generation Based on Dynamic Abstract Syntax Tree. International Journal of Digital Crime and Forensics (IJDCF), 15(1), 1-20. http://doi.org/10.4018/IJDCF.325062
Chicago
Yao, Wenjun, Ying Jiang, and Yang Yang. "The Metric for Automatic Code Generation Based on Dynamic Abstract Syntax Tree," International Journal of Digital Crime and Forensics (IJDCF) 15, no.1: 1-20. http://doi.org/10.4018/IJDCF.325062
Export Reference

Published: Jul 7, 2023
Converted to Gold OA:
DOI: 10.4018/IJDCF.325224
Volume 15
Dawei Zhang
Aiming at the problem that abnormal behavior is difficult to distinguish from normal behavior, a retrieval method for abnormal behavior of laboratory security surveillance video based on deep...
Show More
Aiming at the problem that abnormal behavior is difficult to distinguish from normal behavior, a retrieval method for abnormal behavior of laboratory security surveillance video based on deep automatic encoder is proposed. Firstly, the fuzzy median filtering algorithm is used to reduce the noise of the collected laboratory security surveillance video, and then the YUV spatial chromaticity difference method is used to divide the foreground and background of the video, and the illumination degree in the video is determined. The diagonal model and codebook clustering idea are used to compensate for global and local lighting mutations. Finally, the preprocessed video is input into the mixture model, which is based on the deep automatic encoder and combined with the Gaussian mixture model, and the abnormal behavior retrieval results are output. The experimental results show that the proposed method has good security surveillance video preprocessing effect, large AUC, small error rate of abnormal behavior retrieval, and high operation efficiency.
Content Forthcoming
Add to Your Personal Library: Article Published: Jul 31, 2023
Converted to Gold OA:
DOI: 10.4018/IJDCF.327358
Volume 15
Mathew Nicho, Maha Alblooki, Saeed AlMutiwei, Christopher D. McDermott, Olufemi Ilesanmi
The abundance of digital data within modern vehicles makes digital vehicle forensics (DVF) a promising subfield of digital forensics (DF), with significant potential for investigations. In this...
Show More
The abundance of digital data within modern vehicles makes digital vehicle forensics (DVF) a promising subfield of digital forensics (DF), with significant potential for investigations. In this research, the authors apply DVF methodology to a SUV, simulating a real case by extracting and analyzing the data in the period leading up to an incident to evaluate the effectiveness of DVF in solving crime. The authors employ DVF approach to extract data to reveal evidential information for judicial evaluation and verdict. This data helped determine whether the incident represented an accident or an act of crime. This simulated case and the assumptions supported by the DVF evidence provides a compelling example of how law enforcement agencies can leverage DVF to collect and present evidence to relevant authorities. This form of forensics can assist government in planning for and regulating the deployment of DVF data, the judiciary in assessing the nature and admissibility of evidence, and vehicle manufacturers in complying with the regulations relating to the harvesting and retrieval of data.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Nicho, Mathew, et al. "A Crime Scene Reconstruction for Digital Forensic Analysis: An SUV Case Study." IJDCF vol.15, no.1 2023: pp.1-20. http://doi.org/10.4018/IJDCF.327358
APA
Nicho, M., Alblooki, M., AlMutiwei, S., McDermott, C. D., & Ilesanmi, O. (2023). A Crime Scene Reconstruction for Digital Forensic Analysis: An SUV Case Study. International Journal of Digital Crime and Forensics (IJDCF), 15(1), 1-20. http://doi.org/10.4018/IJDCF.327358
Chicago
Nicho, Mathew, et al. "A Crime Scene Reconstruction for Digital Forensic Analysis: An SUV Case Study," International Journal of Digital Crime and Forensics (IJDCF) 15, no.1: 1-20. http://doi.org/10.4018/IJDCF.327358
Export Reference

Published: Aug 29, 2023
Converted to Gold OA:
DOI: 10.4018/IJDCF.329219
Volume 15
Heng Pan, Yaoyao Zhang, Jianmei Liu, Xueming Si, Zhongyuan Yao, Liang Zhao
In medical data sharing, the data access control authorities of the sharing entities and computing capabilities of the sharing platforms are asymmetric. This asymmetry leads to poor patient control...
Show More
In medical data sharing, the data access control authorities of the sharing entities and computing capabilities of the sharing platforms are asymmetric. This asymmetry leads to poor patient control over their data, privacy disclosure, and difficulties in tracking data sharing. This aarticle proposes a cooperation model of cloud and chain (CMCC) for the secure sharing of medical data. In the CMCC, the power equivalence of blockchain nodes limits the control authority asymmetry between doctors and patients in medical data sharing. Moreover, a cloud server is used to store medical data, and some of the node-side computations are handed over to the cloud, which addresses the asymmetric computing capability asymmetry between the cloud and ordinary nodes. Based on the CMCC, a secure medical data sharing scheme based on proxy re-encryption mechanism is proposed. This scheme realizes secure medical data sharing, especially the patient's complete control of the data. The security and performance analysis show that the proposed scheme outperforms the existing ones.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Pan, Heng, et al. "MD-S3C3: A Medical Data Secure Sharing Scheme With Cloud and Chain Cooperation." IJDCF vol.15, no.1 2023: pp.1-24. http://doi.org/10.4018/IJDCF.329219
APA
Pan, H., Zhang, Y., Liu, J., Si, X., Yao, Z., & Zhao, L. (2023). MD-S3C3: A Medical Data Secure Sharing Scheme With Cloud and Chain Cooperation. International Journal of Digital Crime and Forensics (IJDCF), 15(1), 1-24. http://doi.org/10.4018/IJDCF.329219
Chicago
Pan, Heng, et al. "MD-S3C3: A Medical Data Secure Sharing Scheme With Cloud and Chain Cooperation," International Journal of Digital Crime and Forensics (IJDCF) 15, no.1: 1-24. http://doi.org/10.4018/IJDCF.329219
Export Reference

Published: Oct 12, 2023
Converted to Gold OA:
DOI: 10.4018/IJDCF.332066
Volume 15
Suzhen Wang, Yongchen Deng, Zhongbo Hu
Cloud computing involves transferring data to remote data centers for processing, which consumes significant network bandwidth and transmission time. Edge computing can effectively address this...
Show More
Cloud computing involves transferring data to remote data centers for processing, which consumes significant network bandwidth and transmission time. Edge computing can effectively address this issue by processing tasks at edge nodes, thereby reducing the amount of data transmitted and enhancing the utilization of network bandwidth. This paper investigates intelligent task offloading under the three-layer architecture of cloud-edge-device to fully exploit the cloud-edge collaboration potential. Specifically, an optimization objective function is constructed by modelling the processing cost of all computing tasks. Additionally, asynchronous advantage actor-critic (A3C) algorithm is proposed under cloud-edge collaboration to solve the optimization problem of minimizing the sum of the weights of task offloading delay and energy consumption. Experimental results indicate that the algorithm can effectively utilize the computing resources of the cloud center, reduce task execution delay and energy consumption, and compare favourably with three existing task offloading methods.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Wang, Suzhen, et al. "Task Offloading in Cloud-Edge Environments: A Deep-Reinforcement-Learning-Based Solution." IJDCF vol.15, no.1 2023: pp.1-23. http://doi.org/10.4018/IJDCF.332066
APA
Wang, S., Deng, Y., & Hu, Z. (2023). Task Offloading in Cloud-Edge Environments: A Deep-Reinforcement-Learning-Based Solution. International Journal of Digital Crime and Forensics (IJDCF), 15(1), 1-23. http://doi.org/10.4018/IJDCF.332066
Chicago
Wang, Suzhen, Yongchen Deng, and Zhongbo Hu. "Task Offloading in Cloud-Edge Environments: A Deep-Reinforcement-Learning-Based Solution," International Journal of Digital Crime and Forensics (IJDCF) 15, no.1: 1-23. http://doi.org/10.4018/IJDCF.332066
Export Reference

Published: Oct 25, 2023
Converted to Gold OA:
DOI: 10.4018/IJDCF.332774
Volume 15
Wei Wang, Longxing Xing, Na Xu, Jiatao Su, Wenting Su, Jiarong Cao
When responding to emergencies such as sudden natural disasters, communication networks face challenges such as network traffic surge and complex geographic environments. Aiming at the problems of...
Show More
When responding to emergencies such as sudden natural disasters, communication networks face challenges such as network traffic surge and complex geographic environments. Aiming at the problems of high transmission delay and insensitivity to user's preference in the current UAV edge caching strategy, this paper proposes a UAV caching content recommendation algorithm based on graph neural network. Firstly, the location of UAV is determined by clustering algorithm; secondly, the interest preferences of user nodes in the cluster are predicted by GCLRSAN model, and the UAV cache content is designed according to the result; finally, simulation experiments show that the model and algorithm proposed in this paper can effectively reduce the backhaul link overhead and outperform the comparison algorithms in the indexes such as accuracy rate, recall rate, cache hit rate, and transmission delay.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Wang, Wei, et al. "UAV Edge Caching Content Recommendation Algorithm Based on Graph Neural Network." IJDCF vol.15, no.1 2023: pp.1-24. http://doi.org/10.4018/IJDCF.332774
APA
Wang, W., Xing, L., Xu, N., Su, J., Su, W., & Cao, J. (2023). UAV Edge Caching Content Recommendation Algorithm Based on Graph Neural Network. International Journal of Digital Crime and Forensics (IJDCF), 15(1), 1-24. http://doi.org/10.4018/IJDCF.332774
Chicago
Wang, Wei, et al. "UAV Edge Caching Content Recommendation Algorithm Based on Graph Neural Network," International Journal of Digital Crime and Forensics (IJDCF) 15, no.1: 1-24. http://doi.org/10.4018/IJDCF.332774
Export Reference

Published: Oct 26, 2023
Converted to Gold OA:
DOI: 10.4018/IJDCF.332858
Volume 15
Shi Cheng, Yan Qu, Chuyue Wang, Jie Wan
The internet brings high efficiency and convenience to society; however, the issue of information security in network communication has significantly affected every aspect of the society. How to...
Show More
The internet brings high efficiency and convenience to society; however, the issue of information security in network communication has significantly affected every aspect of the society. How to ensure the security of this network communication information has become an important research topic. This paper proposes a diagnosis and prediction method based on cyber-physical fusion and deep learning, such as LSTM and CNN, to diagnose and predict network security in a complex network environment. The experiment results showed that the accuracy of network security diagnosis of the LSTM method in the training set was approximately 80%/ After the CNN training process, it has the highest accuracy rate of 95% on the test data set. This paper analysed the nature of network security problems from the perspective of cyber-physical fusion. CNN-based method to diagnose network security can obtain results with a higher accuracy rate so that technicians can better take measures to protect network security.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Cheng, Shi, et al. "Assurance of Network Communication Information Security Based on Cyber-Physical Fusion and Deep Learning." IJDCF vol.15, no.1 2023: pp.1-18. http://doi.org/10.4018/IJDCF.332858
APA
Cheng, S., Qu, Y., Wang, C., & Wan, J. (2023). Assurance of Network Communication Information Security Based on Cyber-Physical Fusion and Deep Learning. International Journal of Digital Crime and Forensics (IJDCF), 15(1), 1-18. http://doi.org/10.4018/IJDCF.332858
Chicago
Cheng, Shi, et al. "Assurance of Network Communication Information Security Based on Cyber-Physical Fusion and Deep Learning," International Journal of Digital Crime and Forensics (IJDCF) 15, no.1: 1-18. http://doi.org/10.4018/IJDCF.332858
Export Reference

IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface
that can easily searched or integrated into library discovery systems.
Browse IGI Global Open
Access Collection
All inquiries regarding IJDCF should be directed to the attention of:
Submission-Related InquiriesAll inquiries regarding IJDCF should be directed to the attention of:Feng Liu
Editors-in-Chief
International Journal of Digital Crime and Forensics
E-mails:
liufeng@iie.ac.cnAuthor Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.comOpen Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.comProduction-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.comRights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.comPublication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.comDiscoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100