Journal Navigation
Volume 15, Issue 1
Published: Jan 20, 2023
DOI: 10.4018/IJDCF.317100
Volume 15
Yuwen Zhu, Lei Yu
The key network node identification technology plays an important role in comprehending unknown terrains and rapid action planning in network attack and defense confrontation. The conventional key... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Zhu, Yuwen, and Lei Yu. "Key Node Identification Based on Vulnerability Life Cycle and the Importance of Network Topology." IJDCF vol.15, no.1 2023: pp.1-16. http://doi.org/10.4018/IJDCF.317100

APA

Zhu, Y. & Yu, L. (2023). Key Node Identification Based on Vulnerability Life Cycle and the Importance of Network Topology. International Journal of Digital Crime and Forensics (IJDCF), 15(1), 1-16. http://doi.org/10.4018/IJDCF.317100

Chicago

Zhu, Yuwen, and Lei Yu. "Key Node Identification Based on Vulnerability Life Cycle and the Importance of Network Topology," International Journal of Digital Crime and Forensics (IJDCF) 15, no.1: 1-16. http://doi.org/10.4018/IJDCF.317100

Export Reference

Mendeley
Published: Feb 24, 2023
DOI: 10.4018/IJDCF.318666
Volume 15
Vijay Kumar, Sahil Sharma, Chandan Kumar, Aditya Kumar Sahu
The development of deep convolutional neural networks has been largely responsible for the significant strides forward made in steganography over the past decade. In the field of image... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Kumar, Vijay, et al. "Latest Trends in Deep Learning Techniques for Image Steganography." IJDCF vol.15, no.1 2023: pp.1-14. http://doi.org/10.4018/IJDCF.318666

APA

Kumar, V., Sharma, S., Kumar, C., & Sahu, A. K. (2023). Latest Trends in Deep Learning Techniques for Image Steganography. International Journal of Digital Crime and Forensics (IJDCF), 15(1), 1-14. http://doi.org/10.4018/IJDCF.318666

Chicago

Kumar, Vijay, et al. "Latest Trends in Deep Learning Techniques for Image Steganography," International Journal of Digital Crime and Forensics (IJDCF) 15, no.1: 1-14. http://doi.org/10.4018/IJDCF.318666

Export Reference

Mendeley
Published: Jun 27, 2023
DOI: 10.4018/IJDCF.325062
Volume 15
Wenjun Yao, Ying Jiang, Yang Yang
In order to improve the efficiency and quality of software development, automatic code generation technology is the current focus. The quality of the code generated by the automatic code generation... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Yao, Wenjun, et al. "The Metric for Automatic Code Generation Based on Dynamic Abstract Syntax Tree." IJDCF vol.15, no.1 2023: pp.1-20. http://doi.org/10.4018/IJDCF.325062

APA

Yao, W., Jiang, Y., & Yang, Y. (2023). The Metric for Automatic Code Generation Based on Dynamic Abstract Syntax Tree. International Journal of Digital Crime and Forensics (IJDCF), 15(1), 1-20. http://doi.org/10.4018/IJDCF.325062

Chicago

Yao, Wenjun, Ying Jiang, and Yang Yang. "The Metric for Automatic Code Generation Based on Dynamic Abstract Syntax Tree," International Journal of Digital Crime and Forensics (IJDCF) 15, no.1: 1-20. http://doi.org/10.4018/IJDCF.325062

Export Reference

Mendeley
Published: Jul 7, 2023
DOI: 10.4018/IJDCF.325224
Volume 15
Dawei Zhang
Aiming at the problem that abnormal behavior is difficult to distinguish from normal behavior, a retrieval method for abnormal behavior of laboratory security surveillance video based on deep... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Zhang, Dawei. "Abnormality Retrieval Method of Laboratory Surveillance Video Based on Deep Automatic Encoder." IJDCF vol.15, no.1 2023: pp.1-14. http://doi.org/10.4018/IJDCF.325224

APA

Zhang, D. (2023). Abnormality Retrieval Method of Laboratory Surveillance Video Based on Deep Automatic Encoder. International Journal of Digital Crime and Forensics (IJDCF), 15(1), 1-14. http://doi.org/10.4018/IJDCF.325224

Chicago

Zhang, Dawei. "Abnormality Retrieval Method of Laboratory Surveillance Video Based on Deep Automatic Encoder," International Journal of Digital Crime and Forensics (IJDCF) 15, no.1: 1-14. http://doi.org/10.4018/IJDCF.325224

Export Reference

Mendeley
Published: Jul 31, 2023
DOI: 10.4018/IJDCF.327358
Volume 15
Mathew Nicho, Maha Alblooki, Saeed AlMutiwei, Christopher D. McDermott, Olufemi Ilesanmi
The abundance of digital data within modern vehicles makes digital vehicle forensics (DVF) a promising subfield of digital forensics (DF), with significant potential for investigations. In this... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Nicho, Mathew, et al. "A Crime Scene Reconstruction for Digital Forensic Analysis: An SUV Case Study." IJDCF vol.15, no.1 2023: pp.1-20. http://doi.org/10.4018/IJDCF.327358

APA

Nicho, M., Alblooki, M., AlMutiwei, S., McDermott, C. D., & Ilesanmi, O. (2023). A Crime Scene Reconstruction for Digital Forensic Analysis: An SUV Case Study. International Journal of Digital Crime and Forensics (IJDCF), 15(1), 1-20. http://doi.org/10.4018/IJDCF.327358

Chicago

Nicho, Mathew, et al. "A Crime Scene Reconstruction for Digital Forensic Analysis: An SUV Case Study," International Journal of Digital Crime and Forensics (IJDCF) 15, no.1: 1-20. http://doi.org/10.4018/IJDCF.327358

Export Reference

Mendeley
Published: Aug 29, 2023
DOI: 10.4018/IJDCF.329219
Volume 15
Heng Pan, Yaoyao Zhang, Jianmei Liu, Xueming Si, Zhongyuan Yao, Liang Zhao
In medical data sharing, the data access control authorities of the sharing entities and computing capabilities of the sharing platforms are asymmetric. This asymmetry leads to poor patient control... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Pan, Heng, et al. "MD-S3C3: A Medical Data Secure Sharing Scheme With Cloud and Chain Cooperation." IJDCF vol.15, no.1 2023: pp.1-24. http://doi.org/10.4018/IJDCF.329219

APA

Pan, H., Zhang, Y., Liu, J., Si, X., Yao, Z., & Zhao, L. (2023). MD-S3C3: A Medical Data Secure Sharing Scheme With Cloud and Chain Cooperation. International Journal of Digital Crime and Forensics (IJDCF), 15(1), 1-24. http://doi.org/10.4018/IJDCF.329219

Chicago

Pan, Heng, et al. "MD-S3C3: A Medical Data Secure Sharing Scheme With Cloud and Chain Cooperation," International Journal of Digital Crime and Forensics (IJDCF) 15, no.1: 1-24. http://doi.org/10.4018/IJDCF.329219

Export Reference

Mendeley
Published: Oct 12, 2023
DOI: 10.4018/IJDCF.332066
Volume 15
Suzhen Wang, Yongchen Deng, Zhongbo Hu
Cloud computing involves transferring data to remote data centers for processing, which consumes significant network bandwidth and transmission time. Edge computing can effectively address this... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Wang, Suzhen, et al. "Task Offloading in Cloud-Edge Environments: A Deep-Reinforcement-Learning-Based Solution." IJDCF vol.15, no.1 2023: pp.1-23. http://doi.org/10.4018/IJDCF.332066

APA

Wang, S., Deng, Y., & Hu, Z. (2023). Task Offloading in Cloud-Edge Environments: A Deep-Reinforcement-Learning-Based Solution. International Journal of Digital Crime and Forensics (IJDCF), 15(1), 1-23. http://doi.org/10.4018/IJDCF.332066

Chicago

Wang, Suzhen, Yongchen Deng, and Zhongbo Hu. "Task Offloading in Cloud-Edge Environments: A Deep-Reinforcement-Learning-Based Solution," International Journal of Digital Crime and Forensics (IJDCF) 15, no.1: 1-23. http://doi.org/10.4018/IJDCF.332066

Export Reference

Mendeley
Published: Oct 25, 2023
DOI: 10.4018/IJDCF.332774
Volume 15
Wei Wang, Longxing Xing, Na Xu, Jiatao Su, Wenting Su, Jiarong Cao
When responding to emergencies such as sudden natural disasters, communication networks face challenges such as network traffic surge and complex geographic environments. Aiming at the problems of... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Wang, Wei, et al. "UAV Edge Caching Content Recommendation Algorithm Based on Graph Neural Network." IJDCF vol.15, no.1 2023: pp.1-24. http://doi.org/10.4018/IJDCF.332774

APA

Wang, W., Xing, L., Xu, N., Su, J., Su, W., & Cao, J. (2023). UAV Edge Caching Content Recommendation Algorithm Based on Graph Neural Network. International Journal of Digital Crime and Forensics (IJDCF), 15(1), 1-24. http://doi.org/10.4018/IJDCF.332774

Chicago

Wang, Wei, et al. "UAV Edge Caching Content Recommendation Algorithm Based on Graph Neural Network," International Journal of Digital Crime and Forensics (IJDCF) 15, no.1: 1-24. http://doi.org/10.4018/IJDCF.332774

Export Reference

Mendeley
Published: Oct 26, 2023
DOI: 10.4018/IJDCF.332858
Volume 15
Shi Cheng, Yan Qu, Chuyue Wang, Jie Wan
The internet brings high efficiency and convenience to society; however, the issue of information security in network communication has significantly affected every aspect of the society. How to... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Cheng, Shi, et al. "Assurance of Network Communication Information Security Based on Cyber-Physical Fusion and Deep Learning." IJDCF vol.15, no.1 2023: pp.1-18. http://doi.org/10.4018/IJDCF.332858

APA

Cheng, S., Qu, Y., Wang, C., & Wan, J. (2023). Assurance of Network Communication Information Security Based on Cyber-Physical Fusion and Deep Learning. International Journal of Digital Crime and Forensics (IJDCF), 15(1), 1-18. http://doi.org/10.4018/IJDCF.332858

Chicago

Cheng, Shi, et al. "Assurance of Network Communication Information Security Based on Cyber-Physical Fusion and Deep Learning," International Journal of Digital Crime and Forensics (IJDCF) 15, no.1: 1-18. http://doi.org/10.4018/IJDCF.332858

Export Reference

Mendeley
IGI Global Open Access Collection

IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface that can easily searched or integrated into library discovery systems. Browse IGI Global Open
Access Collection

Contact
Submission-Related Inquiries
All inquiries regarding IJDCF should be directed to the attention of:

Feng Liu
Editors-in-Chief
International Journal of Digital Crime and Forensics
E-mails: liufeng@iie.ac.cn

Author Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.com

Open Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.com

Production-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.com

Rights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.com

Publication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.com

Discoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com

Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100