Register
Login
journal_csdf@nfsu.ac.in
Home
About Us
About Journal
Objective
Area
Guideline
Author's
Editor's
Reviewers
Ethics and Journal Responsibilities
Editorial Board
Issue
Current
Archive
Archive ISSUES
Home
ISSUES
Archive ISSUES
Archive ISSUES (VOL. 1 - ISSUE NO. 1 , Dec,2022)
Conceptual Model of Counter-drone System to Overcome the Current Underlying Technology Limitations
Author (Affiliation):
Naveen Kumar Chaudhary (National Forensic Sciences University)
Date:
2022-December, Vol.1 (Issue.1)
Keywords
Drone, Counter-drone system, sensors, detection, interdiction, spectrum, friend or foe
Abstract
Article View
Intrusion Detection System: A Review on ML Based Methods
Author (Affiliation):
Sachin Sharma (School of Cyber Security and Digital Forensics, National Forensics Sciences University), Vishwas Sharma (Sankalchand Patel University), Dharmesh Shah (SKU)
Date:
2022-December, Vol.1 (Issue.1)
Keywords
Machine Learning, Intrusion detection system (IDS), Performance, Life process, Algorithm, Threat
Abstract
Article View
Web Application Pentesting Approach & Remediation
Author (Affiliation):
Purva Bhesaniya (National Forensic Sciences University), Animesh Kumar Agrawal (NFSU)
Date:
2022-December, Vol.1 (Issue.1)
Keywords
Pentesting, OWASP Top 10 vulnerability
Abstract
Article View
Forensic Investigation: Apple Devices Acquisition & Analysis
Author (Affiliation):
Parag Shukla (School of Cyber Security and Digital Forensics, National Forensic Sciences University), Aditya Pratap (Digital Forensics & Information Security, School of Cyber Security and Digital Forensics, National Forensic Sciences University)
Date:
2022-December, Vol.1 (Issue.1)
Keywords
Acquisition, Apple Devices, Jailbreak, Mac, forensic investigation, ISO
Abstract
Article View
Recent Trends in Medical Image Authentication and Encryption
Author (Affiliation):
Param Ahir (NFSU), Mehul Parikh (Information Technology Department L. D. College of Engineering)
Date:
2022-December, Vol.1 (Issue.1)
Keywords
medical imaging, cyber security, Data Confidentiality, Authentication, Encryption, Image Watermarking
Abstract
Article View