Showing
1 - 12
results of
12
Skip to content
VuFind
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Shamsuddin, Solahuddin
Search Results - Shamsuddin, Solahuddin
Showing
1 - 12
results of
12
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Forensics investigation challenges in cloud computing environments
by
Damshenas, Mohsen
,
Dehghantanha, Ali
,
Mahmod, Ramlan
,
Shamsuddin, Solahuddin
Published 2012
Get full text
Get full text
QR Code
2
Cloud computing and conflicts with digital forensic investigation
by
Damshenas, Mohsen
,
Dehghantanha, Ali
,
Mahmoud, Ramlan
,
Shamsuddin, Solahuddin
Published 2013
Get full text
Get full text
QR Code
3
Event correlation, extra information and merged policies approaches for integrating intrusion detection and access control systems.
by
Halboob, Waleed
,
Alghathbar, Khaled S.
,
Mamat, Ali
,
Mahmod, Ramlan
,
Shamsuddin, Solahuddin
Published 2013
Get full text
Get full text
QR Code
4
Towards secure model for SCADA systems
by
Daryabar, Farid
,
Dehghantanha, Ali
,
Udzir, Nur Izura
,
Mohd Sani, Nor Fazlida
,
Shamsuddin, Solahuddin
Published 2012
Get full text
Get full text
QR Code
5
An overview of neural networks use in anomaly intrusion detection systems
by
Sani, Yusuf
,
Mohamedou, Ahmed
,
Ali, Khalid Abdullahi
,
Farjamfar, Anahita
,
Azman, Mohamed
,
Shamsuddin, Solahuddin
Published 2009
Get full text
Get full text
QR Code
6
A data-centric model for smartphone security
by
Dezfouli, Farhood Norouzizadeh
,
Dehghantanha, Ali
,
Mahmod, Ramlan
,
Mohd Sani, Nor Fazlida
,
Shamsuddin, Solahuddin
Published 2013
Get full text
Get full text
QR Code
7
Volatile memory acquisition using backup for forensic investigation
by
Dezfouli, Farhood Norouzizadeh
,
Dehghantanha, Ali
,
Mahmod, Ramlan
,
Mohd Sani, Nor Fazlida
,
Shamsuddin, Solahuddin
Published 2012
Get full text
Get full text
QR Code
8
A survey about impacts of cloud computing on digital forensics
by
Daryabar, Farid
,
Dehghantanha, Ali
,
Udzir, Nur Izura
,
Mohd Sani, Nor Fazlida
,
Shamsuddin, Solahuddin
,
Norouzizadeh, Farhood
Published 2013
Get full text
Get full text
QR Code
9
A survey on privacy impacts of digital investigation
by
Daryabar, Farid
,
Dehghantanha, Ali
,
Udzir, Nur Izura
,
Mohd Sani, Nor Fazlida
,
Shamsuddin, Solahuddin
,
Norouzizadeh, Farhood
Published 2013
Get full text
Get full text
QR Code
10
Analysis of known and unknown malware bypassing techniques
by
Daryabar, Farid
,
Dehghantanha, Ali
,
Udzir, Nur Izura
,
Mohd Sani, Nor Fazlida
,
Shamsuddin, Solahuddin
,
Norouzizadeh, Farhood
Published 2013
Get full text
Get full text
QR Code
11
Findings Annihilator(s) via Fault Injection Analysis (FIA) on Boolean Function of LILI-128
by
Omar @ Othman, Wan Zariman
,
Mohd Jawi, Suhairi
,
Kamel Ariffin, Muhammad Rezal
,
Mahad, Zahari
,
Shamsuddin, Solahuddin
Published 2020
Get full text
Get full text
QR Code
12
A formal veriļ¬cation and simulation of Common Criteria Recognition Arrangement (CCRA)
by
Mat Isa, Mohd Anuar
,
Mahmod, Ramlan
,
Udzir, Nur Izura
,
Ab Manan, Jamalul-lail
,
Dehghantanha, Ali
,
Shamsuddin, Solahuddin
Published 2017
Get full text
Get full text
QR Code
Search Tools:
RSS Feed
Email Search