Multimedia files signature analysis in Blackberry Z10
Now-a-days, wide range of Smartphone models are available in the market which have a potentially extensive use in criminal activities. Smartphones as ever present devices, capable of connecting to the Internet and transferring huge amount of multimedia files have been identified as growing challenge...
| Main Authors: | Abdullah@Selimun, Mohd. Taufik, Udzir, Nur Izura, Mahmod, Ramlan, Farjamfar, Anahita |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Asian Network for Scientific Information
2015
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/45552/ http://psasir.upm.edu.my/id/eprint/45552/1/Z10.pdf |
Similar Items
A review on mobile device's digital forensic process models
by: Farjamfar, Anahita, et al.
Published: (2014)
by: Farjamfar, Anahita, et al.
Published: (2014)
File integrity monitor scheduling based on file security level classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
Towards a dynamic file integrity monitor through a security classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
Signature-based anomaly intrusion detection using integrated data mining classifiers
by: Yassin, Warusia, et al.
Published: (2014)
by: Yassin, Warusia, et al.
Published: (2014)
An ordered selective imaging and distributed analysis computer forensics model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
A generic smartphone forensic investigation process model
by: Farjamfar, Anahita
Published: (2016)
by: Farjamfar, Anahita
Published: (2016)
Log file analysis using signature detection (LoFA-SD)
by: Koay, Abigail May Yee
Published: (2011)
by: Koay, Abigail May Yee
Published: (2011)
BBQE: multi-language string search approach for blackberry environment
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
Information hiding in multimedia files : a literature review
by: Ali Ja’far, Abdullah Mohammed Abdo, et al.
Published: (2006)
by: Ali Ja’far, Abdullah Mohammed Abdo, et al.
Published: (2006)
Privacy levels for computer forensics: toward a more efficient
privacy-preserving investigation
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
An efficient computer forensics selective imaging model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
The effect of the molecular weight of blackberry polysaccharides on gut microbiota modulation and hypoglycemic effect in vivo
by: Xi, Lai, et al.
Published: (2024)
by: Xi, Lai, et al.
Published: (2024)
Seasonal variation, fractional isolation and nanoencapsulation of antioxidant compounds of Indian blackberry (Syzygium cumini)
by: Shaheen, Rabia, et al.
Published: (2021)
by: Shaheen, Rabia, et al.
Published: (2021)
Rootkit Guard (RG) - an architecture for rootkit resistant file-system implementation based on TPM
by: Yew, Teh Jia, et al.
Published: (2013)
by: Yew, Teh Jia, et al.
Published: (2013)
Performance analysis for extended TLS with mutual attestation for platform integrity assurance
by: Abd Aziz, Norazah, et al.
Published: (2014)
by: Abd Aziz, Norazah, et al.
Published: (2014)
A systematic review of file sharing in mobile devices using peer-to-peer systems
by: Yasin, Waheed, et al.
Published: (2011)
by: Yasin, Waheed, et al.
Published: (2011)
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017)
by: Udzir, Nur Izura, et al.
Published: (2017)
"Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013)
by: Dehghantanha, Ali, et al.
Published: (2013)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
A Review on feature selection and ensemble techniques for intrusion detection system
by: Torabi, Majid, et al.
Published: (2021)
by: Torabi, Majid, et al.
Published: (2021)
Packet header anomaly detection using statistical analysis
by: Yassin, Warusia, et al.
Published: (2014)
by: Yassin, Warusia, et al.
Published: (2014)
A systematic literature review for topic detection in chat conversation for cyber-crime investigation
by: Husin, Norzihan, et al.
Published: (2014)
by: Husin, Norzihan, et al.
Published: (2014)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Host-based packet header anomaly detection using statistical analysis
by: Yassin, Warusia, et al.
Published: (2013)
by: Yassin, Warusia, et al.
Published: (2013)
Systematic literature review and analysis for Arabic text steganography method practically
by: Roslan, Nuur Alifah, et al.
Published: (2022)
by: Roslan, Nuur Alifah, et al.
Published: (2022)
Digital filing and file control system (DFFCS)
by: Teh, Suet Khim
Published: (2005)
by: Teh, Suet Khim
Published: (2005)
Modified shielding function for multi-biometric authentication and template protection / Abayomi Jegede ... [et al.]
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
State of the art in biometric key binding and key generation schemes
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Modified shielding function for multi-biometric authentication and template protection
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Cancelable and hybrid biometric cryptosystems: current directions and open research issues
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Revocable and non-invertible multibiometric template protection based on matrix transformation
by: Jegede, Abayomi, et al.
Published: (2018)
by: Jegede, Abayomi, et al.
Published: (2018)
Sharp-edges method in Arabic text steganography
by: Roslan, Nuur Alifah, et al.
Published: (2011)
by: Roslan, Nuur Alifah, et al.
Published: (2011)
Comparison of file sanitization techniques in usb based on average file entropy valves
by: Onn, Nur Amanina
Published: (2018)
by: Onn, Nur Amanina
Published: (2018)
Comparison of file sanitization techniques in USB based on average file entropy values
by: Onn, Nur Amanina
Published: (2018)
by: Onn, Nur Amanina
Published: (2018)
A cloud-based intrusion detection service framework.
by: Yassin, Warusia, et al.
Published: (2012)
by: Yassin, Warusia, et al.
Published: (2012)
Testing file
by: Ilina, Musa
Published: (2014)
by: Ilina, Musa
Published: (2014)
Corrupt File
by: Cinanni, Gina
Published: (2013)
by: Cinanni, Gina
Published: (2013)
Construction of blackberry polysaccharide nano-selenium particles: Structure features and regulation effects of glucose/lipid metabolism in HepG2 cells
by: Zu-Man, Dou, et al.
Published: (2024)
by: Zu-Man, Dou, et al.
Published: (2024)
Similar Items
-
A review on mobile device's digital forensic process models
by: Farjamfar, Anahita, et al.
Published: (2014) -
File integrity monitor scheduling based on file security level classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011) -
Towards a dynamic file integrity monitor through a security classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011) -
Signature-based anomaly intrusion detection using integrated data mining classifiers
by: Yassin, Warusia, et al.
Published: (2014) -
An ordered selective imaging and distributed analysis computer forensics model
by: Halboob, Waleed, et al.
Published: (2014)