WBEC: A web browsers evidence collection toolkit for web browsers usage in Windows 10
Criminals can utilize the web browser to perform both traditional and cybercrime by looking for information to plan and execute their crimes. As a result, while performing a digital forensic investigation, collecting more forms of digital evidence from a web...
| Main Authors: | Rayman, Dafiqah Mior, Asmawi, Aziah, Mohd Ariffin, Noor Afiza |
|---|---|
| Format: | Article |
| Published: |
Academia Industry Networks
2022
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/102617/ |
Similar Items
Improving collection of data type evidence and the integrity of evidence collected using SHA-256 hashing algorithm for web browsers
by: Asmawi, Aziah, et al.
Published: (2024)
by: Asmawi, Aziah, et al.
Published: (2024)
Automatically identifying coherent web sessions from browser logs
by: Ye, Chaoyu
Published: (2019)
by: Ye, Chaoyu
Published: (2019)
Vulnerability Prevention Model for Web Browser using Interceptor Approach
by: Ahmad Khan, Nayeem, et al.
Published: (2015)
by: Ahmad Khan, Nayeem, et al.
Published: (2015)
The affects of caching in browser stage on the performance of web items delivery
by: Yasin, Waheed, et al.
Published: (2013)
by: Yasin, Waheed, et al.
Published: (2013)
User Perception on Intelligent Split Menu for Web Browser Data Entry
by: Mahamad, Saipunidzam, et al.
Published: (2010)
by: Mahamad, Saipunidzam, et al.
Published: (2010)
Predicting the fraud volume in personal computer using different web browsers
by: Z, Nuha, et al.
Published: (2017)
by: Z, Nuha, et al.
Published: (2017)
Towards Vulnerability Prevention Model for Web Browser
using Interceptor Approach
by: Nayeem, Khan, et al.
Published: (2015)
by: Nayeem, Khan, et al.
Published: (2015)
A graphical browser for hypermedia systems
by: Yong, Huan Loon
Published: (1995)
by: Yong, Huan Loon
Published: (1995)
Towards a video browser for the digital native
by: Adams, Brett, et al.
Published: (2012)
by: Adams, Brett, et al.
Published: (2012)
Website detection for phishing attack by using browser extension
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
Cross-browser compatibility : Problem and solution / Junaidah Ab Aziz
by: Ab Aziz, Junaidah
Published: (2004)
by: Ab Aziz, Junaidah
Published: (2004)
XML for browser-based electronic medical records / Maizirah Ibrahim
by: Maizirah, Ibrahim
Published: (2005)
by: Maizirah, Ibrahim
Published: (2005)
Effects of new-to-market E-store features on first time browsers
by: McKechnie, Sally, et al.
Published: (2016)
by: McKechnie, Sally, et al.
Published: (2016)
Internet browser bookmark synchronization tool / Muhd Baharul Nashim Ibrahim
by: Ibrahim, Muhd Baharul Nashim
Published: (2007)
by: Ibrahim, Muhd Baharul Nashim
Published: (2007)
XML for browser-based electronic medical records / Hafizam Mat Hussin
by: Hafizam, Mat Hussin
Published: (2005)
by: Hafizam, Mat Hussin
Published: (2005)
I-Browser: A real-time digital content display using VR technology
by: Rafi , A., et al.
Published: (2004)
by: Rafi , A., et al.
Published: (2004)
Hadith's source of reference finder browser extension / Mohamad Hafiz Khairuddin … [et al.]
by: Khairuddin, Mohamad Hafiz, et al.
Published: (2017)
by: Khairuddin, Mohamad Hafiz, et al.
Published: (2017)
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
by: Buja, Al Ya@Geogiana, et al.
Published: (2014)
by: Buja, Al Ya@Geogiana, et al.
Published: (2014)
A Multiuser Multiperspective Stereographic QTVR Browser
Complemented by Java3D Visualizer and Emulator
by: Cohen, Michael, et al.
Published: (2007)
by: Cohen, Michael, et al.
Published: (2007)
an investigation into the content of travel blogs including the influence of content on browsers' cognitive states: implications for marketing destinations
by: li, yuejing
Published: (2009)
by: li, yuejing
Published: (2009)
Digital forensics investigation reduction model (DIFReM) framework for Windows 10 OS
by: Shayau, Yazid Haruna, et al.
Published: (2019)
by: Shayau, Yazid Haruna, et al.
Published: (2019)
Interaction between abomasal blood feeder Haemonchus contortus and intestinal mucosal browser Trichostrongylus colubriformis during co-infection in Boer goats
by: Basripuzi, N. Hayyan, et al.
Published: (2020)
by: Basripuzi, N. Hayyan, et al.
Published: (2020)
Performance analysis of SWOT suite toolkit on Inter-domain and Intra-domain Web of Things
by: Anuar, Nur Ameera, et al.
Published: (2017)
by: Anuar, Nur Ameera, et al.
Published: (2017)
Windows web proxy caching simulation: a tool for simulating web proxy caching under windows operating systems
by: Yasin, Waheed, et al.
Published: (2014)
by: Yasin, Waheed, et al.
Published: (2014)
Exploring consumers attitude towards web advertising and its influence on
web ad usage in Malaysia
by: Norzalita Abd Aziz,, et al.
Published: (2010)
by: Norzalita Abd Aziz,, et al.
Published: (2010)
Improved web page recommender system based on web usage mining
by: Almurtadha, Yahya Mohammed, et al.
Published: (2011)
by: Almurtadha, Yahya Mohammed, et al.
Published: (2011)
Mining Web usage using FRS
by: Omar, Rosli, et al.
Published: (2018)
by: Omar, Rosli, et al.
Published: (2018)
The PROSPER Toolkit
by: Dennis, Louise Abigail, et al.
Published: (2000)
by: Dennis, Louise Abigail, et al.
Published: (2000)
Communications Toolkit
by: Grellier, Jane, et al.
Published: (2018)
by: Grellier, Jane, et al.
Published: (2018)
Two level security approaches for secure XML database centric web services against xpath injections
by: Asmawi, Aziah
Published: (2016)
by: Asmawi, Aziah
Published: (2016)
The Evolution of the Internet in the Business Sector: Web 1.0 to Web 3.0.
by: Isaias, P., et al.
Published: (2015)
by: Isaias, P., et al.
Published: (2015)
A framework for measuring ontology usage on the web
by: Ashraf, Jamshaid, et al.
Published: (2013)
by: Ashraf, Jamshaid, et al.
Published: (2013)
Rough fuzzy approach for web usage mining
by: Chimphlee, Siriporn, et al.
Published: (2006)
by: Chimphlee, Siriporn, et al.
Published: (2006)
The Social Startup Toolkit
by: Ely, Philip
Published: (2018)
by: Ely, Philip
Published: (2018)
A Web-Based Recommendation System To Predict User Movements Through Web Usage Mining
by: Jalali, Mehrdad
Published: (2009)
by: Jalali, Mehrdad
Published: (2009)
Web usage mining: A review of recent works
by: Omar, Rosli, et al.
Published: (2015)
by: Omar, Rosli, et al.
Published: (2015)
Forensics visualization of Windows 10 registry
by: Awang, Muhamad Safwan
Published: (2019)
by: Awang, Muhamad Safwan
Published: (2019)
Web usage mining using kuktem e-community application
by: Hasimah, Razak
Published: (2005)
by: Hasimah, Razak
Published: (2005)
My-Peer Toolkit 1.0: Guidelines for planning, implementing and evaluating peer-based youth programs.
by: Hallett, Jonathan, et al.
Published: (2010)
by: Hallett, Jonathan, et al.
Published: (2010)
Bilingual virtual toolkit ‘let’s twist’
by: Nazir, Faridah, et al.
Published: (2018)
by: Nazir, Faridah, et al.
Published: (2018)
Similar Items
-
Improving collection of data type evidence and the integrity of evidence collected using SHA-256 hashing algorithm for web browsers
by: Asmawi, Aziah, et al.
Published: (2024) -
Automatically identifying coherent web sessions from browser logs
by: Ye, Chaoyu
Published: (2019) -
Vulnerability Prevention Model for Web Browser using Interceptor Approach
by: Ahmad Khan, Nayeem, et al.
Published: (2015) -
The affects of caching in browser stage on the performance of web items delivery
by: Yasin, Waheed, et al.
Published: (2013) -
User Perception on Intelligent Split Menu for Web Browser Data Entry
by: Mahamad, Saipunidzam, et al.
Published: (2010)