Mobile and Forensics

ISSN 2656-6257 (Print) | 2714-6685 (Online)

Accreditation: Sinta 3

Organizers: Universitas Ahmad Dahlan

Contact:

Ahmad Azhari

Email: ahmad.azhari@tif.uad.ac.id

Phone/Mobile: -

About the journal

Mobile and Forensics (MF) is a national peer-reviewed open access journal organized by the Department of Magister Teknik Informatika, Universitas Ahmad Dahlan. It is a semi-annual journal published in March and September. The main objective of the publication is to create a platform to publish original articles, researches results, case studies, and book reviews related to the field of Mobile Technology and Digital Forensics. The editorial board welcomes original contributions of the author (in English and Bahasa Indonesia) which never been published or under consideration for publication in any other publication.

Aims and Scope

The Mobile and Forensics (MF) Journal scope covers the following areas (but not limited to): Applications and case studies of database systems, knowledge base systems, and expert systems Applications and case studies of Artificial Intelligence (AI) and Machine Learning Internet of Things (IoT) Image Processing & Computer Vision Conceptual data models Data-knowledge manipulation languages and techniques Cybersecurity, Computer forensics, privacy, trust, hacking techniques Cyber warfare, cryptography, cybercrime, cyber-terrorism, cryptography, formal methods application in security and forensics, data piracy, Database security and forensics, Wired and wireless network security and investigation, Mobile network security and forensics, incident handling, Malware forensics Steganography. Electronic security, information security systems, systems, and network security Vulnerability research, ethical hacking, zero-day attack, attack pattern recognition Computational immunology, authentication authorizations Security in mobile platforms, mobile agents/artificial intelligence Security: security policies/procedures, strategic approaches, requirements engineering Identity: theft, management systems, access management systems Open source intelligence, criminal data mining/network analysis/intelligence Phishing/pharming/spearphishing, cyberwar, cybercrime detection/analysis Digital cities, GSM-solicited crime Computer/mobile device/network/software forensics, anti-forensics Digital forensics tools/techniques/standardisation, testing/approvals for forensic tools Crime scene/search and seizure processes, criminal investigation of mobile devices Investigative techniques, judicial processes, legal/ethical issues, cybercrime legislations Digital and physical surveillance, digital image manipulation Cryptographic algorithms/protocols, steganography, hidden data