An efficient computer forensics selective imaging model
Selective imaging is a new concept in computer forensics. It is used for collecting only the data that is relevant to the crime and helps in improves the scalability of the investigation process. However, the current selective imaging approaches directly image the identified data without considering...
| Main Authors: | Halboob, Waleed, Alghathbar, Khaled S., Mahmod, Ramlan, Udzir, Nur Izura, Abdullah @ Selimun, Mohd Taufik, Deghantanha, Ali |
|---|---|
| Other Authors: | Park, James J. (Jong Hyuk) |
| Format: | Book Section |
| Language: | English |
| Published: |
Springer
2014
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/36400/ http://psasir.upm.edu.my/id/eprint/36400/1/An%20efficient%20computer%20forensics%20selective%20imaging%20model.pdf |
Similar Items
An ordered selective imaging and distributed analysis computer forensics model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
Privacy levels for computer forensics: toward a more efficient
privacy-preserving investigation
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
TC-enabled and distributed cloud computing access control model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
A review on mobile device's digital forensic process models
by: Farjamfar, Anahita, et al.
Published: (2014)
by: Farjamfar, Anahita, et al.
Published: (2014)
Privacy-preserving computer forensics framework
by: Halboob, Waleed Abduljabbar
Published: (2015)
by: Halboob, Waleed Abduljabbar
Published: (2015)
Advances in computer forensics
by: Abdullah @ Selimun, Mohd Taufik, et al.
Published: (2008)
by: Abdullah @ Selimun, Mohd Taufik, et al.
Published: (2008)
Event correlation, extra information and merged policies approaches for integrating intrusion detection and access control systems.
by: Halboob, Waleed, et al.
Published: (2013)
by: Halboob, Waleed, et al.
Published: (2013)
Trusted-based scalable access control model for broadcast XML documents.
by: Halboob, Waleed, et al.
Published: (2013)
by: Halboob, Waleed, et al.
Published: (2013)
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013)
by: Dehghantanha, Ali, et al.
Published: (2013)
An approach for forensic investigation in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
Advances of mobile forensic procedures in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
Mobile forensic data acquisition in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
Performance measurement for mobile forensic data acquisition in Firefox OS
by: Yusoof, Mohd Najwadi, et al.
Published: (2014)
by: Yusoof, Mohd Najwadi, et al.
Published: (2014)
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Forensics investigation challenges in cloud computing environments
by: Damshenas, Mohsen, et al.
Published: (2012)
by: Damshenas, Mohsen, et al.
Published: (2012)
Multimedia files signature analysis in Blackberry Z10
by: Abdullah@Selimun, Mohd. Taufik, et al.
Published: (2015)
by: Abdullah@Selimun, Mohd. Taufik, et al.
Published: (2015)
A survey about impacts of cloud computing on digital forensics
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
Cloud forensics issues and oppurtunities
by: Aminnezhad, Asou, et al.
Published: (2013)
by: Aminnezhad, Asou, et al.
Published: (2013)
UPEM : user-centered privacy evaluation model in pervasive computing system.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
UPEM : user-centered privacy evaluation model in pervasive computing systems.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
A Review on feature selection and ensemble techniques for intrusion detection system
by: Torabi, Majid, et al.
Published: (2021)
by: Torabi, Majid, et al.
Published: (2021)
A distributed push-based XML access control model for better scalability
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2008)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2008)
VoIP evidence model: a new forensic method for investigating VoIP malicious attacks
by: Ibrahim, Mohammed, et al.
Published: (2012)
by: Ibrahim, Mohammed, et al.
Published: (2012)
Cloud computing and conflicts with digital forensic investigation
by: Damshenas, Mohsen, et al.
Published: (2013)
by: Damshenas, Mohsen, et al.
Published: (2013)
A survey on digital forensics trends
by: Dehghantanha, Ali, et al.
Published: (2014)
by: Dehghantanha, Ali, et al.
Published: (2014)
Critical phases in network forensics - a review
by: Nik Abdull Malik, Nik Mariza, et al.
Published: (2014)
by: Nik Abdull Malik, Nik Mariza, et al.
Published: (2014)
Push-based XML access control policy languages: a review
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2014)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2014)
Adaptive feature selection for denial of services (DoS) attack
by: Yusof, Ahmad Riza'ain, et al.
Published: (2017)
by: Yusof, Ahmad Riza'ain, et al.
Published: (2017)
Features selection for ids in encrypted traffic using genetic algorithm
by: Barati, Mehdi, et al.
Published: (2013)
by: Barati, Mehdi, et al.
Published: (2013)
Temporal, delegable and cheap update access control to published XML documents.
by: Halboob, Waleed, et al.
Published: (2013)
by: Halboob, Waleed, et al.
Published: (2013)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017)
by: Udzir, Nur Izura, et al.
Published: (2017)
Efficient skyline computation over an incomplete database with changing states and structures
by: Babanejaddehaki, Ghazaleh, et al.
Published: (2021)
by: Babanejaddehaki, Ghazaleh, et al.
Published: (2021)
A systematic literature review for topic detection in chat conversation for cyber-crime investigation
by: Husin, Norzihan, et al.
Published: (2014)
by: Husin, Norzihan, et al.
Published: (2014)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Features selection for IDS in encrypted traffic using genetic algorithm
by: Barati, Mehdi, et al.
Published: (2013)
by: Barati, Mehdi, et al.
Published: (2013)
Enhance luhn algorithm for validation of credit cards numbers.
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Enhance Luhn algorithm for validation of identity card numbers (ID card)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Design and implementation of multi factor mechanism for secure authentication system
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
A novel authentication scheme to increase security for non-repudiation of users
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Similar Items
-
An ordered selective imaging and distributed analysis computer forensics model
by: Halboob, Waleed, et al.
Published: (2014) -
Privacy levels for computer forensics: toward a more efficient
privacy-preserving investigation
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015) -
TC-enabled and distributed cloud computing access control model
by: Halboob, Waleed, et al.
Published: (2014) -
A review on mobile device's digital forensic process models
by: Farjamfar, Anahita, et al.
Published: (2014) -
Privacy-preserving computer forensics framework
by: Halboob, Waleed Abduljabbar
Published: (2015)