International Journal of Electronic Security and Digital Forensics
Published by Inderscience Publishers
ISSN : 1751-911X eISSN : 1751-9128
Abbreviation : Int. J. Electron. Secur. Digit. Forensics
Aims & Scope
IJESDF aims to establish dialogue in an ideal and unique setting for researchers and practitioners to have a knowledge resource, report and publish scholarly articles and engage in debate on various security-related issues, new developments and latest proven methodologies in the field of electronic security and digital forensics.
This includes the measures governments must take to protect the security of information on the Internet, the implications of cyber-crime in large corporations and for individuals, vulnerability research, zero day attacks, digital forensic investigation, ethical hacking, anti-forensics, identity fraud, phishing, pharming, relevant case studies, and "best practice" for tackling cyber crime.
View Aims & ScopeMetrics & Ranking
Impact Factor
Year | Value |
---|---|
2025 | 0.5 |
2024 | 0.40 |
Journal Rank
Year | Value |
---|---|
2024 | 21039 |
Journal Citation Indicator
Year | Value |
---|---|
2024 | 187 |
SJR (SCImago Journal Rank)
Year | Value |
---|---|
2024 | 0.202 |
Quartile
Year | Value |
---|---|
2024 | Q3 |
h-index
Year | Value |
---|---|
2024 | 19 |
Impact Factor Trend
Abstracting & Indexing
Journal is indexed in leading academic databases, ensuring global visibility and accessibility of our peer-reviewed research.
Subjects & Keywords
Journal’s research areas, covering key disciplines and specialized sub-topics in Computer Science, Engineering and Social Sciences, designed to support cutting-edge academic discovery.
Most Cited Articles
The Most Cited Articles section features the journal's most impactful research, based on citation counts. These articles have been referenced frequently by other researchers, indicating their significant contribution to their respective fields.
-
Improved wireless security for GMSK-based devices using RF fingerprinting
Citation: 69
Authors: Donald R., Michael A., Michael J.
-
Radio frequency fingerprinting commercial communication devices to enhance electronic security
Citation: 65
Authors: William C. Suski, Michael A., Michael J., Robert F.
-
Integrating security and usability into the requirements and design process
Citation: 57
Authors: Ivan, Cecilia, M. Angela
-
A machine learning approach to keystroke dynamics based user authentication
Citation: 52
Authors: Kenneth, Florin, Marina, Marius, Sergio Tenreiro de, Henrique M. Dinis
-
Identifying phishing attacks in communication networks using URL consistency features
Citation: 45
Authors: Nureni Ayofe, Balikis Bolanle, Sanjay, Robertas, Rytis
-
New methodology in facial composite construction: from theory to practice
Citation: 30
Authors: Stuart J., Chris J., Matthew I.S., Clifford
-
Hybrid technique for robust and imperceptible dual watermarking using error correcting codes for application in telemedicine
Citation: 24
Authors: Amit Kumar, Mayank, Anand
-
Vulnerabilities in e-governments
Citation: 24
Authors: Vebjorn, Andre N., Kent Inge Fagerland, Kjell Jorgen