Windows 10 instant messaging application forensics
The way netizens communicate with each other deeper with the advent of Instant Messaging applications (IM apps). Thus, its flexibility and quick response on the IM apps has attracted the attentions of cybercriminal operations on the apps such as identity theft and phishing. The forensic investiga...
| Main Author: | Shehu, Aliyu Usman |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2018
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/68922/ http://psasir.upm.edu.my/id/eprint/68922/1/FSKTM%202018%2034%20IR.pdf |
Similar Items
Enhanced IP spoofing defense through clustered interdomain packet filtering strategy
by: Lee, Soon
Published: (2011)
by: Lee, Soon
Published: (2011)
Pola Penggunaan Perkhidmatan Pesanan Ringkas Dalam Kalangan Pelajar Institusi Pengajian Tinggi
by: Aripin, Norizah
Published: (2004)
by: Aripin, Norizah
Published: (2004)
Security Enhancement of Route Optimization in Mobile IPv6 Networks
by: Zare Anari, Abbas Mehdizadeh
Published: (2008)
by: Zare Anari, Abbas Mehdizadeh
Published: (2008)
Performance analysis of OSPF and EIGRP protocols in a very dynamic network
by: Ahmed Mohammed, Abdul Nasser, et al.
Published: (2009)
by: Ahmed Mohammed, Abdul Nasser, et al.
Published: (2009)
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
by: Khalid, Roszelinda
Published: (2018)
by: Khalid, Roszelinda
Published: (2018)
Forensics visualization of Windows 10 registry
by: Awang, Muhamad Safwan
Published: (2019)
by: Awang, Muhamad Safwan
Published: (2019)
Mobility schemes in clustered proxy mobile IPv6
by: Al-Humrany, Adnan Jumaa Jabir
Published: (2015)
by: Al-Humrany, Adnan Jumaa Jabir
Published: (2015)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
by: Javan, Ali
Published: (2011)
by: Javan, Ali
Published: (2011)
Network security situation awareness based on indicators extracted
by: Xie, Zeqiang
Published: (2016)
by: Xie, Zeqiang
Published: (2016)
Design of a lightweight virtual honeynet based on linux container virtualization
by: Memari, Nogol
Published: (2014)
by: Memari, Nogol
Published: (2014)
Risk awareness model for security and privacy in social networking sites from the users’ perspective
by: Abiodun, Balogun Kamoru
Published: (2021)
by: Abiodun, Balogun Kamoru
Published: (2021)
Improved TLS protocol for platform integrity assurance using mutual attestation
by: Abd Aziz, Norazah
Published: (2014)
by: Abd Aziz, Norazah
Published: (2014)
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
by: Sjaugi, Muhammad Farhan
Published: (2008)
by: Sjaugi, Muhammad Farhan
Published: (2008)
Protecting network with Cisco solution
Published: (2008)
Published: (2008)
Web-Based Network Device Monitoring Tool Using Simple Network Management Protocol (Snmp)
by: Hossen, Md.Jakir
Published: (2003)
by: Hossen, Md.Jakir
Published: (2003)
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
by: Ismail, Haqi Khalid
Published: (2021)
by: Ismail, Haqi Khalid
Published: (2021)
Fake review annotation model and classification through reviewers' writing style
by: Shojaee, Somayeh
Published: (2019)
by: Shojaee, Somayeh
Published: (2019)
Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks
by: Raja Mohd Auzar, Tengku Dian Shahida
Published: (2009)
by: Raja Mohd Auzar, Tengku Dian Shahida
Published: (2009)
Performance of Ad-Hoc on-Demand Distance Vector Discovery Algorithms Based On Packet Lifetime
by: Ahmad, Noor Azlan
Published: (2008)
by: Ahmad, Noor Azlan
Published: (2008)
Steganography in webpages using CSS color attributes enhanced by rule-based system
by: Nehzati, Seyedeh Sheida
Published: (2016)
by: Nehzati, Seyedeh Sheida
Published: (2016)
Increasing TCP friendliness by implementing simple adaptive congestion control framework in wireless network
by: Elangkovan, Sri Ganesh
Published: (2018)
by: Elangkovan, Sri Ganesh
Published: (2018)
Quantum key distribution protocols in transmission control protocol
by: Kamarul Aizan, Nur Hanani
Published: (2012)
by: Kamarul Aizan, Nur Hanani
Published: (2012)
An investigation and simulation of novel dynamic routing methods
by: Saleh, Mohammad
Published: (2001)
by: Saleh, Mohammad
Published: (2001)
Platform Property Certificate for Property-Based Attestation Model
by: Borhan, Nazanin
Published: (2011)
by: Borhan, Nazanin
Published: (2011)
A multi-factor authentication scheme using attack recognition and key generator technique
by: Mohd Ariffin, Noor Afiza
Published: (2017)
by: Mohd Ariffin, Noor Afiza
Published: (2017)
Weighted Window for TCP Fair Bandwidth Allocation in Wireless Lans
by: Seyedzadegan, Mojtaba
Published: (2008)
by: Seyedzadegan, Mojtaba
Published: (2008)
Modelling and simulation of improved scarani-acin-ribordy-GISIN-04 preprocessing technique
by: Mohd Nasir, Rinie Narinie
Published: (2015)
by: Mohd Nasir, Rinie Narinie
Published: (2015)
Handover enhancement in IP mobility for 6LoWPAN scenario
by: Abdulrahman, Ahmed Faris
Published: (2016)
by: Abdulrahman, Ahmed Faris
Published: (2016)
Cisco aims for higher productivity
Published: (2008)
Published: (2008)
Traffic Balancing Method in Shortest Path Routing
by: Mohamed Abdulqader, Makarem
Published: (2007)
by: Mohamed Abdulqader, Makarem
Published: (2007)
Stability improved of improved low energy adaptive clustering hierarchy routing protocol for wireless sensor network
by: Sabah Talib, Al-Zubaidi Ammar
Published: (2017)
by: Sabah Talib, Al-Zubaidi Ammar
Published: (2017)
A mobility management scheme for proxy mobile IPv6 wireless sensor networks
by: Ghaleb, Safwan Mahmood Yahya
Published: (2019)
by: Ghaleb, Safwan Mahmood Yahya
Published: (2019)
Performance of Transmission Control Protocol (TCP) Congestion Control Over Wireless Links Using Modified Snoop Protocol
by: Moojid, Furat Asmat
Published: (2003)
by: Moojid, Furat Asmat
Published: (2003)
Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network
by: Jahan, Mohammad Saukat
Published: (2015)
by: Jahan, Mohammad Saukat
Published: (2015)
Hexagonal grid-based dynamic routing adjustment for optimising network lifetime in wireless sensor network
by: Jarallah, Zaid Fawaz
Published: (2017)
by: Jarallah, Zaid Fawaz
Published: (2017)
Orthogonal Frequency Division Multiple Access resource unit allocation algorithms for IEEE 802.11AX medium access control protocol
by: Zazali, Azyyati Adiah
Published: (2024)
by: Zazali, Azyyati Adiah
Published: (2024)
Demand for IP services to grow
Published: (2008)
Published: (2008)
Design and development of dynamic queue storage and floating IP active measurement in IP networks
by: Tabbakh Farizani, Seyed Reza Kamel
Published: (2011)
by: Tabbakh Farizani, Seyed Reza Kamel
Published: (2011)
Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks
by: Saleh, Ahmed Mohammed Shamsan
Published: (2012)
by: Saleh, Ahmed Mohammed Shamsan
Published: (2012)
Similar Items
-
Enhanced IP spoofing defense through clustered interdomain packet filtering strategy
by: Lee, Soon
Published: (2011) -
Pola Penggunaan Perkhidmatan Pesanan Ringkas Dalam Kalangan Pelajar Institusi Pengajian Tinggi
by: Aripin, Norizah
Published: (2004) -
Security Enhancement of Route Optimization in Mobile IPv6 Networks
by: Zare Anari, Abbas Mehdizadeh
Published: (2008) -
Performance analysis of OSPF and EIGRP protocols in a very dynamic network
by: Ahmed Mohammed, Abdul Nasser, et al.
Published: (2009) -
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
by: Khalid, Roszelinda
Published: (2018)