Critical phases in network forensics - a review
The fragility nature of digital evidence required an adequate investigation procedure to maintain its admissibility. Thus, a Digital Forensic Investigation (DFI) models and frameworks had been proposed by many researchers. These models and frameworks cover all processes involved in investigating dig...
| Main Authors: | Nik Abdull Malik, Nik Mariza, Yahya, Saadiah, Abdullah @ Selimun, Mohd Taufik |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
The Society of Digital Information and Wireless Communications (SDIWC)
2014
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/39825/ http://psasir.upm.edu.my/id/eprint/39825/1/39825.pdf |
Similar Items
Grocery shopping assistant for visually impaired / Ahmad Yusri Dak, Saadiah Yahya and Nik Mariza Nik Abdull Malik
by: Dak, Ahmad Yusri, et al.
Published: (2008)
by: Dak, Ahmad Yusri, et al.
Published: (2008)
A review on mobile device's digital forensic process models
by: Farjamfar, Anahita, et al.
Published: (2014)
by: Farjamfar, Anahita, et al.
Published: (2014)
Cloud forensics issues and oppurtunities
by: Aminnezhad, Asou, et al.
Published: (2013)
by: Aminnezhad, Asou, et al.
Published: (2013)
An approach for forensic investigation in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
Advances in computer forensics
by: Abdullah @ Selimun, Mohd Taufik, et al.
Published: (2008)
by: Abdullah @ Selimun, Mohd Taufik, et al.
Published: (2008)
Advances of mobile forensic procedures in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
Mobile forensic data acquisition in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
A signature based intrusion detection system (IDS) : using snort / Nik Mariza Nik Abdul Malik
by: Nik Abdul Malik, Nik Mariza
Published: (2004)
by: Nik Abdul Malik, Nik Mariza
Published: (2004)
VoIP evidence model: a new forensic method for investigating VoIP malicious attacks
by: Ibrahim, Mohammed, et al.
Published: (2012)
by: Ibrahim, Mohammed, et al.
Published: (2012)
Performance measurement for mobile forensic data acquisition in Firefox OS
by: Yusoof, Mohd Najwadi, et al.
Published: (2014)
by: Yusoof, Mohd Najwadi, et al.
Published: (2014)
An efficient computer forensics selective imaging model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
An ordered selective imaging and distributed analysis computer forensics model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
Privacy levels for computer forensics: toward a more efficient
privacy-preserving investigation
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
Behavioral intention to use forensic accounting services: a critical review of theories and an integrative model
by: Gunasegaran, Muthusamy, et al.
Published: (2010)
by: Gunasegaran, Muthusamy, et al.
Published: (2010)
A review of digital forensics methods for JPEG file carving
by: ALI, RABEI RAAD, et al.
Published: (2018)
by: ALI, RABEI RAAD, et al.
Published: (2018)
The ethics of online social network forensics
by: Kim, J., et al.
Published: (2016)
by: Kim, J., et al.
Published: (2016)
Formalization in digital forensic triage for identification of malicious IoT devices
by: Ibrahim, Mohammed, et al.
Published: (2019)
by: Ibrahim, Mohammed, et al.
Published: (2019)
A systematic literature review for topic detection in chat conversation for cyber-crime investigation
by: Husin, Norzihan, et al.
Published: (2014)
by: Husin, Norzihan, et al.
Published: (2014)
Capillary electrophoresis for forensic drug analysis: A review
by: Anastos, N., et al.
Published: (2005)
by: Anastos, N., et al.
Published: (2005)
Future technology: Software-defined network (SDN) forensic
by: Waseem, Quadri, et al.
Published: (2021)
by: Waseem, Quadri, et al.
Published: (2021)
Digital Forensic Automation Model For Online Social Networks
by: Arshad, Humaira
Published: (2019)
by: Arshad, Humaira
Published: (2019)
Novel solid-phase microextraction adsorbent for the forensic detection of accelerants in arson samples
by: Selvaraju, Geetha
Published: (2007)
by: Selvaraju, Geetha
Published: (2007)
A review on environmental forensics and environmental law in the Malaysian perspective
by: Mustafa, Maizatun, et al.
Published: (2014)
by: Mustafa, Maizatun, et al.
Published: (2014)
Ageing patients in forensic psychiatric settings: a review of the literature
by: Di Lorito, Claudio, et al.
Published: (2018)
by: Di Lorito, Claudio, et al.
Published: (2018)
A review on environmental forensics and environmental law in the Malaysian perspective
by: Mustafa, Maizatun, et al.
Published: (2013)
by: Mustafa, Maizatun, et al.
Published: (2013)
A review on environmental forensics and environmental law in the Malaysian perspective
by: Mustafa, Maizatun, et al.
Published: (2013)
by: Mustafa, Maizatun, et al.
Published: (2013)
The uses of coercive measures in forensic psychiatry: a literature review
by: Hui, Ada M.L., et al.
Published: (2016)
by: Hui, Ada M.L., et al.
Published: (2016)
An overview review on the effectiveness of critical thinking on knowledge
by: Yaacob, Solehah@Nik Najah Fadilah
Published: (2016)
by: Yaacob, Solehah@Nik Najah Fadilah
Published: (2016)
Forensic of Solar PV: A review of potential faults and maintenance strategies
by: Siti Nor Azlina, Mohd Ghazali, et al.
Published: (2021)
by: Siti Nor Azlina, Mohd Ghazali, et al.
Published: (2021)
A systematic review of Bring Your Own Device (BYOD) authentication technique
by: Jamal, Fara, et al.
Published: (2020)
by: Jamal, Fara, et al.
Published: (2020)
Analytical method for forensic investigation of social networking applications on smartphones
by: Dezfouli, Farhood Norouzizadeh
Published: (2016)
by: Dezfouli, Farhood Norouzizadeh
Published: (2016)
Shock condition forensics and cryptic phase transformations from crystallographic orientation relationships in zircon
by: Timms, N., et al.
Published: (2016)
by: Timms, N., et al.
Published: (2016)
A Review on feature selection and ensemble techniques for intrusion detection system
by: Torabi, Majid, et al.
Published: (2021)
by: Torabi, Majid, et al.
Published: (2021)
The barriers and facilitators influencing the effectiveness of high secure forensic care: a critical realist qualitative study
by: Guite, John P.
Published: (2022)
by: Guite, John P.
Published: (2022)
Analytical separations of mammalian decomposition products for forensic science: A review
by: Swann, Lisa, et al.
Published: (2010)
by: Swann, Lisa, et al.
Published: (2010)
Greening cloud-enabled big data storage forensics: syncany as a case study
by: Teing, Yee-Yang, et al.
Published: (2019)
by: Teing, Yee-Yang, et al.
Published: (2019)
Wireless Sensor Network transport protocol: A critical review
by: Rathnayaka, Dinusha, et al.
Published: (2011)
by: Rathnayaka, Dinusha, et al.
Published: (2011)
Forensic science in Seychelles: An example of a micro-jurisdiction forensic delivery system
by: Bouzin, Jemmy T, et al.
Published: (2021)
by: Bouzin, Jemmy T, et al.
Published: (2021)
Forensic analysis of explosives from water samples using solid phase microextraction-gas chromatography
by: Kiu, Kee Heng
Published: (2006)
by: Kiu, Kee Heng
Published: (2006)
Network forensics: detection and mitigation of botnet malicious code via darknet
by: R. Othman, R. Azrina, et al.
Published: (2012)
by: R. Othman, R. Azrina, et al.
Published: (2012)
Similar Items
-
Grocery shopping assistant for visually impaired / Ahmad Yusri Dak, Saadiah Yahya and Nik Mariza Nik Abdull Malik
by: Dak, Ahmad Yusri, et al.
Published: (2008) -
A review on mobile device's digital forensic process models
by: Farjamfar, Anahita, et al.
Published: (2014) -
Cloud forensics issues and oppurtunities
by: Aminnezhad, Asou, et al.
Published: (2013) -
An approach for forensic investigation in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014) -
Advances in computer forensics
by: Abdullah @ Selimun, Mohd Taufik, et al.
Published: (2008)