Proposed intelligence systems based on digital Forensics : Review paper
The field of information security, in general, has seen shifts a traditional approach to an intelligence system. Moreover, an increasing of researchers to focus on propose intelligence systems and framework based on the forensic case studies because of the limitations of traditional methods such as...
| Main Authors: | Ismael Sahib, Hussein, Alsudani, Mustafa Qahtan, Ali, Mohammed Hasan, Qassim Abbas, Haydar, Moorthy, Kohbalan, Adnan, Myasar Mundher |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Elsevier Ltd
2023
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/40453/ http://umpir.ump.edu.my/id/eprint/40453/1/Proposed%20intelligence%20systems%20based%20on%20digital%20Forensics.pdf http://umpir.ump.edu.my/id/eprint/40453/2/Proposed%20intelligence%20systems%20based%20on%20digital%20Forensics_Review%20paper_ABS.pdf |
Similar Items
A new hybrid teaching learning based optimization -extreme learning machine model based intrusion-detection system
by: Alsudani, Mustafa Qahtan, et al.
Published: (2023)
by: Alsudani, Mustafa Qahtan, et al.
Published: (2023)
Adapting Traceability in Digital Forensic Investigation Process
by: Selamat, S. R., et al.
Published: (2011)
by: Selamat, S. R., et al.
Published: (2011)
Propose a New Machine Learning Algorithm based on Cancer Diagnosis
by: Ali, Mohammed Hasan, et al.
Published: (2018)
by: Ali, Mohammed Hasan, et al.
Published: (2018)
Survival analysis for the identified cancer gene subtype from the co-clustering algorithm
by: Logenthiran, Machap, et al.
Published: (2022)
by: Logenthiran, Machap, et al.
Published: (2022)
Driver alcohol monitoring system for vehicle safety control with emergency contact
by: Devanesam SimpsoN, Emmanuel, et al.
Published: (2021)
by: Devanesam SimpsoN, Emmanuel, et al.
Published: (2021)
Optical character recognition using backpropagation neural network for handwritten digit characters
by: Yap, Mei Ing, et al.
Published: (2021)
by: Yap, Mei Ing, et al.
Published: (2021)
An evidence-based forensic taxonomy of Windows phone communication apps
by: Wahyu Cahyani, Niken Dwi, et al.
Published: (2018)
by: Wahyu Cahyani, Niken Dwi, et al.
Published: (2018)
Digital Forensic Automation Model For Online Social Networks
by: Arshad, Humaira
Published: (2019)
by: Arshad, Humaira
Published: (2019)
Whale Optimisation Freeman Chain Code (WO-FCC) extraction algorithm for handwritten character recognition
by: Muhammad Arif, Mohamad, et al.
Published: (2021)
by: Muhammad Arif, Mohamad, et al.
Published: (2021)
Digital examination question paper maker and analyser / Eng Cheng Kait
by: Eng , Cheng Kait
Published: (2004)
by: Eng , Cheng Kait
Published: (2004)
Investigating computer forensic tools and their searching technique
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
Comprehensive analysis on hardware forensic for gambling machine
by: Magalingam, Pritheega
Published: (2008)
by: Magalingam, Pritheega
Published: (2008)
Improvement of the POLISAS e-request transcript system using query optimization
by: Mohd Hariz, Ibrahim, et al.
Published: (2020)
by: Mohd Hariz, Ibrahim, et al.
Published: (2020)
An improved image compression technique using large adaptive DCT psychovisual thresholds
by: Ernawan, Ferda, et al.
Published: (2019)
by: Ernawan, Ferda, et al.
Published: (2019)
CDS523 β Forensic Analytics and Digital Investigations June 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
CDS523 β Forensic Analytics and Digital Investigations June 2019
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
Guideline for forensic analysis on windows XP and vista registry
by: Aghanvesi, Somayeh
Published: (2008)
by: Aghanvesi, Somayeh
Published: (2008)
Forensic investigation of link fabrication attack in software defined networks / Suleman Khan
by: Suleman , Khan
Published: (2017)
by: Suleman , Khan
Published: (2017)
Robust partitioning and indexing for iris biometric database based on local features
by: Khalaf, Emad Taha, et al.
Published: (2018)
by: Khalaf, Emad Taha, et al.
Published: (2018)
A Defensive Evidence Model: An Approach of Security Model for Storing Digital Evidence in Network Forensics
by: Mohd Izham, Ibrahim, et al.
Published: (2012)
by: Mohd Izham, Ibrahim, et al.
Published: (2012)
Intelligent responses through network-based answer discovery with advanced reasoning
by: Wong, Wilson, et al.
Published: (2005)
by: Wong, Wilson, et al.
Published: (2005)
A Robust Firearm Identification Algorithm of Forensic Ballistics Specimens
by: Z. L., Chuan, et al.
Published: (2017)
by: Z. L., Chuan, et al.
Published: (2017)
Anti-forensic steganography method based on randomization
by: Khalaf, Emad Taha, et al.
Published: (2013)
by: Khalaf, Emad Taha, et al.
Published: (2013)
Transmissibility prediction of coronavirus disease (covid-19) outbreak in early stages
by: Wong, Jordan, et al.
Published: (2021)
by: Wong, Jordan, et al.
Published: (2021)
Computational intelligence: Itβs application in digital watermarking
by: Olanrewaju, Rashidah Funke, et al.
Published: (2013)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2013)
Future technology: Software-defined network (SDN) forensic
by: Waseem, Quadri, et al.
Published: (2021)
by: Waseem, Quadri, et al.
Published: (2021)
Mobile health applications digital evidence taxonomy with knowledge sharing approach for digital forensics readiness
by: Abdul Razak, Muhammad Thariq
Published: (2020)
by: Abdul Razak, Muhammad Thariq
Published: (2020)
Filtering approaches and mish activation function applied on handwritten chinese character recognition
by: Yingna, Zhong, et al.
Published: (2024)
by: Yingna, Zhong, et al.
Published: (2024)
Network forensics: detection and mitigation of botnet malicious code via darknet
by: R. Othman, R. Azrina, et al.
Published: (2012)
by: R. Othman, R. Azrina, et al.
Published: (2012)
The importance of data classification using machine learning methods in microarray data
by: Jaber, Aws Naser, et al.
Published: (2021)
by: Jaber, Aws Naser, et al.
Published: (2021)
A blind multiple watermarks based on human visual characteristics
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
Multi-stage feature selection in identifying potential biomarkers for cancer classification
by: Wong, Yit Khee, et al.
Published: (2022)
by: Wong, Yit Khee, et al.
Published: (2022)
Structure of research proposal
by: Taha Alshaikhli, Imad Fakhri
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri
Published: (2017)
Optimisation of Biochemical Systems Production using Hybrid of Newton Method, Differential Evolution Algorithm and Cooperative Coevolution Algorithm
by: Mohd Arfian, Ismail, et al.
Published: (2017)
by: Mohd Arfian, Ismail, et al.
Published: (2017)
Mobile device forensics: extracting and analysing data from an android-based smartphone
by: Abdul Aziz, Normaziah, et al.
Published: (2016)
by: Abdul Aziz, Normaziah, et al.
Published: (2016)
Lightweight block cipher algorithms: review paper
by: Salim, Sufyan, et al.
Published: (2016)
by: Salim, Sufyan, et al.
Published: (2016)
SPM Malay language paper II learning package / Thevi Ramasamy
by: Thevi, Ramasamy
Published: (2000)
by: Thevi, Ramasamy
Published: (2000)
Nomadic people optimizer (NPO) for large-scale optimization problems
by: Mohamd Salih, Sinan Qahtan
Published: (2019)
by: Mohamd Salih, Sinan Qahtan
Published: (2019)
CDS523 β Forensic Analytics and Digital Investigations
(Analitik Forensik dan Penyiasatan Digital) July/August 2021
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
An evidence-based forensic taxonomy of windows phone dating apps
by: Wahyu Cahyani, Niken Dwi, et al.
Published: (2019)
by: Wahyu Cahyani, Niken Dwi, et al.
Published: (2019)
Similar Items
-
A new hybrid teaching learning based optimization -extreme learning machine model based intrusion-detection system
by: Alsudani, Mustafa Qahtan, et al.
Published: (2023) -
Adapting Traceability in Digital Forensic Investigation Process
by: Selamat, S. R., et al.
Published: (2011) -
Propose a New Machine Learning Algorithm based on Cancer Diagnosis
by: Ali, Mohammed Hasan, et al.
Published: (2018) -
Survival analysis for the identified cancer gene subtype from the co-clustering algorithm
by: Logenthiran, Machap, et al.
Published: (2022) -
Driver alcohol monitoring system for vehicle safety control with emergency contact
by: Devanesam SimpsoN, Emmanuel, et al.
Published: (2021)