Investigating computer forensic tools and their searching technique
| Main Authors: | Abdul Aziz, Normaziah, Ali, Aniyath, Abdul Wahab, Mahmoud |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
IIUM Press
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/20488/ http://irep.iium.edu.my/20488/1/c6-_an_anthology.pdf |
Similar Items
Mobile device forensics: extracting and analysing data from an android-based smartphone
by: Abdul Aziz, Normaziah, et al.
Published: (2016)
by: Abdul Aziz, Normaziah, et al.
Published: (2016)
Network forensics: detection and mitigation of botnet malicious code via darknet
by: R. Othman, R. Azrina, et al.
Published: (2012)
by: R. Othman, R. Azrina, et al.
Published: (2012)
Adapting Traceability in Digital Forensic Investigation Process
by: Selamat, S. R., et al.
Published: (2011)
by: Selamat, S. R., et al.
Published: (2011)
Techniques for analysing android malware
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
The trend of mobile malwares and effective detection techniques
by: Abdul Aziz, Normaziah, et al.
Published: (2015)
by: Abdul Aziz, Normaziah, et al.
Published: (2015)
Malware detection through machine learning techniques
by: Amer, Ahmed, et al.
Published: (2019)
by: Amer, Ahmed, et al.
Published: (2019)
Feature engineering techniques to classify cause of death from forensic autopsy reports / Ghulam Mujtaba
by: Ghulam , Mujtaba
Published: (2018)
by: Ghulam , Mujtaba
Published: (2018)
Brute force password search using multithreading and grid computing
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
CART - an Arabic teaching-learning tool for non-native Arabic speakers
by: Shuib, Ahmad Hasanul Ishraf, et al.
Published: (2014)
by: Shuib, Ahmad Hasanul Ishraf, et al.
Published: (2014)
Forensic investigation of link fabrication attack in software defined networks / Suleman Khan
by: Suleman , Khan
Published: (2017)
by: Suleman , Khan
Published: (2017)
Pairwise test suite generator tool based on harmony search algorithm (HS-PTSGT)
by: Lai, Yi Xiang
Published: (2014)
by: Lai, Yi Xiang
Published: (2014)
Comprehensive analysis on hardware forensic for gambling machine
by: Magalingam, Pritheega
Published: (2008)
by: Magalingam, Pritheega
Published: (2008)
CDS523 – Forensic Analytics and Digital Investigations June 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
CDS523 – Forensic Analytics and Digital Investigations June 2019
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
Hypervisor IDPS: DDoS Prevention Tool for Cloud Computing
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
Guideline for forensic analysis on windows XP and vista registry
by: Aghanvesi, Somayeh
Published: (2008)
by: Aghanvesi, Somayeh
Published: (2008)
Computer Aided 3d Skull - 2d Photo Superimposition For Forensic Anthropology
by: Tan, Joi San
Published: (2017)
by: Tan, Joi San
Published: (2017)
Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
A Robust Firearm Identification Algorithm of Forensic Ballistics Specimens
by: Z. L., Chuan, et al.
Published: (2017)
by: Z. L., Chuan, et al.
Published: (2017)
On the impact of using optimization search method in large speaker database based on hybrid modeling over experimental investigation
by: Ahmad, Abdul Manan, et al.
Published: (2008)
by: Ahmad, Abdul Manan, et al.
Published: (2008)
UTMGO : a tool for searching a group of semantically related gene ontology terms and application to annotation of anonymous protein sequence
by: Deris, Safaai, et al.
Published: (2006)
by: Deris, Safaai, et al.
Published: (2006)
Ontology matching: in search of challenges ahead
by: Farooqui, N.K., et al.
Published: (2015)
by: Farooqui, N.K., et al.
Published: (2015)
A new search and extraction technique for motion capture data
by: Mohamad, Rafidei
Published: (2008)
by: Mohamad, Rafidei
Published: (2008)
Logical-linguistic semantic in search engine
by: Tengku Sembok, Tengku Mohd, et al.
Published: (2012)
by: Tengku Sembok, Tengku Mohd, et al.
Published: (2012)
Logical-linguistic semantic in search engine
by: Tengku Sembok, Tengku Mohd, et al.
Published: (2012)
by: Tengku Sembok, Tengku Mohd, et al.
Published: (2012)
Competency assessment of short free text answers
by: Lajis, Adidah, et al.
Published: (2014)
by: Lajis, Adidah, et al.
Published: (2014)
NL scoring and Bloom competency test: an experimental result
by: Lajis, Adidah, et al.
Published: (2012)
by: Lajis, Adidah, et al.
Published: (2012)
A Review on Soft Computing Technique in Intrusion Detection System
by: Sulaiman, Noor Suhana, et al.
Published: (2012)
by: Sulaiman, Noor Suhana, et al.
Published: (2012)
The comparison of tardiness in scheduling techniques for task distribution using grid simulation tool
by: Stapa @ Mustapa, Muhamad Azhar
Published: (2008)
by: Stapa @ Mustapa, Muhamad Azhar
Published: (2008)
Development of an intelligent prediction tool for rice yield based on machine learning techniques
by: Md. Sap, Mohd. Noor, et al.
Published: (2006)
by: Md. Sap, Mohd. Noor, et al.
Published: (2006)
The development of virtual product life cycle design tool using artificial intelligence technique
by: Harun, Habibollah, et al.
Published: (2008)
by: Harun, Habibollah, et al.
Published: (2008)
Web application - What makes it secure or insecure?
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
An algebraic approach for sentence based feature extraction applied for automatic text summarization
by: Batcha, Nowshath Kadhar, et al.
Published: (2014)
by: Batcha, Nowshath Kadhar, et al.
Published: (2014)
An intelligence based model for the prevention of advanced cyber-attacks
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
A new efficient text detection method for image spam filtering
by: Al Muataz, Zubaidah, et al.
Published: (2015)
by: Al Muataz, Zubaidah, et al.
Published: (2015)
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
by: Adebayo, Olawale Surajudeen, et al.
Published: (2015)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2015)
Ringed seal search for global optimization via a sensitive search model / Younes Saadi
by: Younes, Saadi
Published: (2018)
by: Younes, Saadi
Published: (2018)
Pornography addiction detection based on Neurophysiological computational approach
by: Kamaruddin, Norhaslinda, et al.
Published: (2018)
by: Kamaruddin, Norhaslinda, et al.
Published: (2018)
Fusion of similarity measures using genetic algorithm for searching chemical database
by: Rahman Ali, Yahya Ali Abdel
Published: (2007)
by: Rahman Ali, Yahya Ali Abdel
Published: (2007)
Similar Items
-
Mobile device forensics: extracting and analysing data from an android-based smartphone
by: Abdul Aziz, Normaziah, et al.
Published: (2016) -
Network forensics: detection and mitigation of botnet malicious code via darknet
by: R. Othman, R. Azrina, et al.
Published: (2012) -
Adapting Traceability in Digital Forensic Investigation Process
by: Selamat, S. R., et al.
Published: (2011) -
Techniques for analysing android malware
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014) -
The trend of mobile malwares and effective detection techniques
by: Abdul Aziz, Normaziah, et al.
Published: (2015)