Advances in computer forensics
Constant developments in information technology and communication have posed challenges for those policing cyber crimes. Due to the application of computer used to investigate computer-based crime has led to development of a new field called computer forensics. This paper discusses the research cate...
| Main Authors: | Abdullah @ Selimun, Mohd Taufik, Mahmod, Ramlan, Abd Ghani, Abdul Azim, Abdullah, Mohd Zain, Md Sultan, Abu Bakar |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
2008
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/12952/ http://psasir.upm.edu.my/id/eprint/12952/1/Advances%20in%20computer%20forensics.pdf |
Similar Items
Advances of mobile forensic procedures in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
An efficient computer forensics selective imaging model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
An ordered selective imaging and distributed analysis computer forensics model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
An approach for forensic investigation in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
Privacy levels for computer forensics: toward a more efficient
privacy-preserving investigation
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
Mobile forensic data acquisition in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
Performance measurement for mobile forensic data acquisition in Firefox OS
by: Yusoof, Mohd Najwadi, et al.
Published: (2014)
by: Yusoof, Mohd Najwadi, et al.
Published: (2014)
A review on mobile device's digital forensic process models
by: Farjamfar, Anahita, et al.
Published: (2014)
by: Farjamfar, Anahita, et al.
Published: (2014)
Cloud forensics issues and oppurtunities
by: Aminnezhad, Asou, et al.
Published: (2013)
by: Aminnezhad, Asou, et al.
Published: (2013)
Forensics investigation challenges in cloud computing environments
by: Damshenas, Mohsen, et al.
Published: (2012)
by: Damshenas, Mohsen, et al.
Published: (2012)
Evaluating premature convergence for metaheuristic.
by: Md Sultan, Abu Bakar, et al.
Published: (2008)
by: Md Sultan, Abu Bakar, et al.
Published: (2008)
Critical phases in network forensics - a review
by: Nik Abdull Malik, Nik Mariza, et al.
Published: (2014)
by: Nik Abdull Malik, Nik Mariza, et al.
Published: (2014)
VoIP evidence model: a new forensic method for investigating VoIP malicious attacks
by: Ibrahim, Mohammed, et al.
Published: (2012)
by: Ibrahim, Mohammed, et al.
Published: (2012)
A systematic literature review for topic detection in chat conversation for cyber-crime investigation
by: Husin, Norzihan, et al.
Published: (2014)
by: Husin, Norzihan, et al.
Published: (2014)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Cloud computing and conflicts with digital forensic investigation
by: Damshenas, Mohsen, et al.
Published: (2013)
by: Damshenas, Mohsen, et al.
Published: (2013)
A survey on digital forensics trends
by: Dehghantanha, Ali, et al.
Published: (2014)
by: Dehghantanha, Ali, et al.
Published: (2014)
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013)
by: Dehghantanha, Ali, et al.
Published: (2013)
Investigating computer forensic tools and their searching technique
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
Multimedia files signature analysis in Blackberry Z10
by: Abdullah@Selimun, Mohd. Taufik, et al.
Published: (2015)
by: Abdullah@Selimun, Mohd. Taufik, et al.
Published: (2015)
Privacy-preserving computer forensics framework
by: Halboob, Waleed Abduljabbar
Published: (2015)
by: Halboob, Waleed Abduljabbar
Published: (2015)
Volatile memory acquisition using backup for forensic investigation
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2012)
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2012)
The implementation of agent based complaint management system
by: Md Sultan, Abu Bakar, et al.
Published: (2008)
by: Md Sultan, Abu Bakar, et al.
Published: (2008)
Formalization in digital forensic triage for identification of malicious IoT devices
by: Ibrahim, Mohammed, et al.
Published: (2019)
by: Ibrahim, Mohammed, et al.
Published: (2019)
Unveiling the hidden truth: The evolution and advancement of forensic accounting in Indonesia
by: Ika Sari, Wahyuni TD, et al.
Published: (2024)
by: Ika Sari, Wahyuni TD, et al.
Published: (2024)
Enhance luhn algorithm for validation of credit cards numbers.
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Enhance Luhn algorithm for validation of identity card numbers (ID card)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Design and implementation of multi factor mechanism for secure authentication system
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
A novel authentication scheme to increase security for non-repudiation of users
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Active authentication by one time password based on unique factor and behavioral biometric
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Digital forensics trends and future
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013)
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013)
A survey about impacts of cloud computing on digital forensics
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
Towards preprocessing on criminal chatting corpus.
by: Marjuni, Siti Hanom, et al.
Published: (2009)
by: Marjuni, Siti Hanom, et al.
Published: (2009)
Lexical criminal identification for chatting corpus
by: Marjuni, Siti Hanom, et al.
Published: (2009)
by: Marjuni, Siti Hanom, et al.
Published: (2009)
Digital Forensics Investigation Frameworks for Cloud
Computing and Internet of Things
by: Pichan, Ameer
Published: (2022)
by: Pichan, Ameer
Published: (2022)
On the automation of vulnerabilities fixing for web application
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
SQL Injection attack roadmap and fusion
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
Prevention of attack on Islamic websites by fixing SQL injection vulnerabilities using co-evolutionary search approach
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
The Advanced Framework for Evaluating Remote Agents (AFERA):
A Framework for Digital Forensic Practitioners
by: Adams, Richard Brian
Published: (2023)
by: Adams, Richard Brian
Published: (2023)
Comparing web vulnerability scanners with a new method for SQL injection vulnerabilities detection and removal EPSQLiFix
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
Similar Items
-
Advances of mobile forensic procedures in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014) -
An efficient computer forensics selective imaging model
by: Halboob, Waleed, et al.
Published: (2014) -
An ordered selective imaging and distributed analysis computer forensics model
by: Halboob, Waleed, et al.
Published: (2014) -
An approach for forensic investigation in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014) -
Privacy levels for computer forensics: toward a more efficient
privacy-preserving investigation
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)