A survey on privacy impacts of digital investigation
Digital forensics is becoming more and more demanding as computers evolve into different platforms and penetrate different industries. The usage of computers in today’s society has covered in vast areas and are implemented in fields where the most sensitive information are stored and accessed for va...
| Main Authors: | Daryabar, Farid, Dehghantanha, Ali, Udzir, Nur Izura, Mohd Sani, Nor Fazlida, Shamsuddin, Solahuddin, Norouzizadeh, Farhood |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Advanced Institute of Convergence Information Technology
2013
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/30587/ http://psasir.upm.edu.my/id/eprint/30587/1/A%20survey%20on%20privacy%20impacts%20of%20digital%20investigation.pdf |
Similar Items
A survey about impacts of cloud computing on digital forensics
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
Analysis of known and unknown malware bypassing techniques
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
Digital forensics trends and future
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013)
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013)
Towards secure model for SCADA systems
by: Daryabar, Farid, et al.
Published: (2012)
by: Daryabar, Farid, et al.
Published: (2012)
Volatile memory acquisition using backup for forensic investigation
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2012)
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2012)
Investigation of bypassing malware defences and malware detections
by: Daryabar, Farid, et al.
Published: (2011)
by: Daryabar, Farid, et al.
Published: (2011)
Privacy-respecting digital investigation
by: Dehghantanha, Ali, et al.
Published: (2014)
by: Dehghantanha, Ali, et al.
Published: (2014)
A data-centric model for smartphone security
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013)
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013)
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013)
by: Dehghantanha, Ali, et al.
Published: (2013)
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Analytical method for forensic investigation of social networking applications on smartphones
by: Dezfouli, Farhood Norouzizadeh
Published: (2016)
by: Dezfouli, Farhood Norouzizadeh
Published: (2016)
Cloud computing and conflicts with digital forensic investigation
by: Damshenas, Mohsen, et al.
Published: (2013)
by: Damshenas, Mohsen, et al.
Published: (2013)
UPEM : user-centered privacy evaluation model in pervasive computing system.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
UPEM : user-centered privacy evaluation model in pervasive computing systems.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Digital forensics framework for investigating client cloud storage applications on smartphones
by: Daryabar, Farid
Published: (2015)
by: Daryabar, Farid
Published: (2015)
Privacy levels for computer forensics: toward a more efficient
privacy-preserving investigation
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
Performance and divisional trust and purpose-based access control for privacy preservation
by: Salji, Mohd Rafiz, et al.
Published: (2018)
by: Salji, Mohd Rafiz, et al.
Published: (2018)
Trust, purpose, and role-based access control model for privacy protection
by: Salji, Mohd Rafiz, et al.
Published: (2019)
by: Salji, Mohd Rafiz, et al.
Published: (2019)
Xml-Based Privacy Model in Pervasive Computing
by: Dehghantanha, Ali
Published: (2008)
by: Dehghantanha, Ali
Published: (2008)
A survey on digital forensics trends
by: Dehghantanha, Ali, et al.
Published: (2014)
by: Dehghantanha, Ali, et al.
Published: (2014)
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017)
by: Udzir, Nur Izura, et al.
Published: (2017)
Forensics investigation challenges in cloud computing environments
by: Damshenas, Mohsen, et al.
Published: (2012)
by: Damshenas, Mohsen, et al.
Published: (2012)
Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices
by: Daryabar, Farid, et al.
Published: (2016)
by: Daryabar, Farid, et al.
Published: (2016)
Smart-contract privacy preservation mechanism
by: Siraj, Muhammed, et al.
Published: (2023)
by: Siraj, Muhammed, et al.
Published: (2023)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
Comprehensive survey on Big Data Privacy
Protection
by: BinJubeir, Mohammed, et al.
Published: (2019)
by: BinJubeir, Mohammed, et al.
Published: (2019)
A formal verification and simulation of Common Criteria Recognition Arrangement (CCRA)
by: Mat Isa, Mohd Anuar, et al.
Published: (2017)
by: Mat Isa, Mohd Anuar, et al.
Published: (2017)
Big Healthcare Data: Survey of Challenges and Privacy
by: Mohammed, Jubeir, et al.
Published: (2020)
by: Mohammed, Jubeir, et al.
Published: (2020)
Born Digital?: Presence, Privacy, and Intimate Surveillance
by: Leaver, Tama
Published: (2015)
by: Leaver, Tama
Published: (2015)
Cyber warfare trends and future
by: Ganji, Majid, et al.
Published: (2013)
by: Ganji, Majid, et al.
Published: (2013)
Privacy and trust in the Islamic perspective: implication of the digital age
by: Lubis, Muharman, et al.
Published: (2013)
by: Lubis, Muharman, et al.
Published: (2013)
Digital privacy as a currency in the big data ecosystem
by: Zulhuda, Sonny
Published: (2015)
by: Zulhuda, Sonny
Published: (2015)
Human rights treaties and foreign surveillance: privacy in the digital age
by: Milanovic, Marko
Published: (2015)
by: Milanovic, Marko
Published: (2015)
Digital privacy and personal, social and civic agency: refugees' experiences
by: Voigts, Matthew
Published: (2020)
by: Voigts, Matthew
Published: (2020)
Privacy Impact Assessment (PIA): From management tools towards a privacy culture
by: Zulhuda, Sonny
Published: (2013)
by: Zulhuda, Sonny
Published: (2013)
From privacy impact assessment to Social Impact Assessment
by: Edwards, Lilian, et al.
Published: (2016)
by: Edwards, Lilian, et al.
Published: (2016)
Right of privacy in the digital age: legal challenges in the Malaysian judicial landscape
by: Che Hasan, Siti Selihah, et al.
Published: (2018)
by: Che Hasan, Siti Selihah, et al.
Published: (2018)
A survey on privacy-preserving authentication schemes in VANETs: attacks, challenges and open issues
by: Ahmed Jan, Sagheer, et al.
Published: (2021)
by: Ahmed Jan, Sagheer, et al.
Published: (2021)
A survey on cyber-crime prediction techniques
by: Shaerpour, Kaveh, et al.
Published: (2013)
by: Shaerpour, Kaveh, et al.
Published: (2013)
A survey on malware propagation, analysis, and detection
by: Damshenas, Mohsen, et al.
Published: (2013)
by: Damshenas, Mohsen, et al.
Published: (2013)
Similar Items
-
A survey about impacts of cloud computing on digital forensics
by: Daryabar, Farid, et al.
Published: (2013) -
Analysis of known and unknown malware bypassing techniques
by: Daryabar, Farid, et al.
Published: (2013) -
Digital forensics trends and future
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013) -
Towards secure model for SCADA systems
by: Daryabar, Farid, et al.
Published: (2012) -
Volatile memory acquisition using backup for forensic investigation
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2012)