Forensics visualization of Windows 10 registry
The increase with the volume of data created in digital devices has make the process of evidences analysis become difficult especially for forensic investigator. In addition, most of the existing forensic tools nowadays not all able to provide good visualization of registry information. Some of tool...
| Main Author: | Awang, Muhamad Safwan |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2019
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/82965/ http://psasir.upm.edu.my/id/eprint/82965/1/FSKTM%202019%2031%20IR.pdf |
Similar Items
Digital forensic investigation reduction model (DIFReM) for Windows 10 OS
by: Shayau, Yazid Haruna
Published: (2018)
by: Shayau, Yazid Haruna
Published: (2018)
A forensics acquisition method of WhatsApp data on Android smartphone
by: Muzakir, Ummu Khosyatillah
Published: (2018)
by: Muzakir, Ummu Khosyatillah
Published: (2018)
HPC+Azure Environment for Bioinformatics Applications
by: Sidhu, Amandeep, et al.
Published: (2013)
by: Sidhu, Amandeep, et al.
Published: (2013)
Windows 10 instant messaging application forensics
by: Shehu, Aliyu Usman
Published: (2018)
by: Shehu, Aliyu Usman
Published: (2018)
Guideline for forensic analysis on windows XP and vista registry
by: Aghanvesi, Somayeh
Published: (2008)
by: Aghanvesi, Somayeh
Published: (2008)
Microsoft profit up 79%
Published: (2008)
Published: (2008)
Using the old to open the new
Published: (2008)
Published: (2008)
Making Windows XP more like Vista
Published: (2008)
Published: (2008)
Vista to come in six flavours
Published: (2008)
Published: (2008)
Rated window method and packet size differentiation scheme for TCP fairness in IEEE 802.11 WLAN
by: Rasul, Tareq
Published: (2011)
by: Rasul, Tareq
Published: (2011)
Development of optimum window size in tropical climate using computational fluid dynamics and experimental works
by: Wahhad, Ali Mohamad
Published: (2016)
by: Wahhad, Ali Mohamad
Published: (2016)
Analytical method for forensic investigation of social networking applications on smartphones
by: Dezfouli, Farhood Norouzizadeh
Published: (2016)
by: Dezfouli, Farhood Norouzizadeh
Published: (2016)
The development of novel window systems towards low carbon buildings
by: Liu, Haoyang
Published: (2012)
by: Liu, Haoyang
Published: (2012)
A Comparative Study on Compression of Different Image File Formats
by: Ooi, Poh San
Published: (1999)
by: Ooi, Poh San
Published: (1999)
Effects of Authentication of Users in Mobile Internet Protocol Version 6
by: Obenofunde, Simon Tabi
Published: (2004)
by: Obenofunde, Simon Tabi
Published: (2004)
Minimizing cost in order to achieve nutrition needs using goal programming : a case study in UiTM Perlis / Nurul Asyikin Supardi
by: Supardi, Nurul Asyikin
Published: (2019)
by: Supardi, Nurul Asyikin
Published: (2019)
A study on influential factors of occupant window-opening behavior in an office building in China
by: Song, Pan, et al.
Published: (2018)
by: Song, Pan, et al.
Published: (2018)
Honeynet as a service deployment approach in enabling virtual crime scene investigation
by: Hasheminejad, Hamidreza
Published: (2015)
by: Hasheminejad, Hamidreza
Published: (2015)
Scientific forensic framework for smartphones
by: Shahpasand, Maryam
Published: (2015)
by: Shahpasand, Maryam
Published: (2015)
Peraturan pengurusan rekod yang derivative / Abd Rahman Ahmad
by: Ahmad, Abd Rahman
Published: (2015)
by: Ahmad, Abd Rahman
Published: (2015)
A score based malware classification approach for mobile forensic analysis
by: Gobi, Ramyaa
Published: (2019)
by: Gobi, Ramyaa
Published: (2019)
Window views in the built environment: preferences and behaviours
by: Batool, Ayesha
Published: (2021)
by: Batool, Ayesha
Published: (2021)
A critical analysis on the computer misuse in cyber cafes and its governance in Shah Alam / Khairul Aizat Khairuddin, Khairunnisa Othman
by: Khairuddin, Khairul Aizat, et al.
Published: (2007)
by: Khairuddin, Khairul Aizat, et al.
Published: (2007)
Computer Crimes Act 1997 v Computer Misuse Act 1993: the effectiveness in curbing hackers / Effa Suzieana Zainal, Nor Haslina Ismail and Nur Asyikin Mansoor.
by: Zainal, Effa Suzieana, et al.
Published: (2007)
by: Zainal, Effa Suzieana, et al.
Published: (2007)
A legal analysis on online pornographic law in Malaysia / Amirul Haziq Ahmad … [et al.]
by: Ahmad, Amirul Haziq, et al.
Published: (2014)
by: Ahmad, Amirul Haziq, et al.
Published: (2014)
A study on the protection of application software in Malaysia / Sarah Nadrah Muzaffa, Tuan Ruzuaini Tuan Lah
by: Muzaffa, Sarah Nadrah, et al.
Published: (2007)
by: Muzaffa, Sarah Nadrah, et al.
Published: (2007)
Smart windows—-dynamic control of building energy performance
by: Allen, Kaitlin, et al.
Published: (2017)
by: Allen, Kaitlin, et al.
Published: (2017)
Benchmarking Large Scale Cloud Computing in Asia Pacific
by: Sabri, A., et al.
Published: (2013)
by: Sabri, A., et al.
Published: (2013)
The adequacy of MyDRP in dealing with cybersquatters in Malaysia / Irianie Abdul Wahab
by: Abdul Wahab, Irianie
Published: (2005)
by: Abdul Wahab, Irianie
Published: (2005)
Indexing strategies of MapReduce for information retrieval in big data
by: Ramadhan, Mazen Farid Ebrahim
Published: (2016)
by: Ramadhan, Mazen Farid Ebrahim
Published: (2016)
Smart window photovoltaic concentrator for energy generation and solar control
by: Salas castillo, Manlio
Published: (2021)
by: Salas castillo, Manlio
Published: (2021)
Controlled atmosphere storage of 'Delta R2E2' mango fruit affects production of aroma volatile compounds
by: Lalel, Herianus, et al.
Published: (2006)
by: Lalel, Herianus, et al.
Published: (2006)
An analysis on the discourse of Powerpoint presentation slides of ESL novice learners / Nurliyana Isa
by: Isa, Nurliyana
Published: (2014)
by: Isa, Nurliyana
Published: (2014)
Ambient-Aware smart monitor / Aiman Azhar
by: Azhar, Aiman
Published: (2020)
by: Azhar, Aiman
Published: (2020)
An evidence-based forensic taxonomy of Windows phone communication apps
by: Wahyu Cahyani, Niken Dwi, et al.
Published: (2018)
by: Wahyu Cahyani, Niken Dwi, et al.
Published: (2018)
DDOS avoidance strategy for service avalibilty
by: AlRashidi, Bedour Fahhad Hamed
Published: (2015)
by: AlRashidi, Bedour Fahhad Hamed
Published: (2015)
Security alert framework using dynamic tweet-based features for phishing detection on twitter
by: Liew, Seow Wooi
Published: (2019)
by: Liew, Seow Wooi
Published: (2019)
An evidence-based forensic taxonomy of windows phone dating apps
by: Wahyu Cahyani, Niken Dwi, et al.
Published: (2019)
by: Wahyu Cahyani, Niken Dwi, et al.
Published: (2019)
Sentiment mining using immune network algorithm /Raja Muhammad Hafiz Raja Kamarudin
by: Raja Kamarudin, Raja Muhammad Hafiz
Published: (2012)
by: Raja Kamarudin, Raja Muhammad Hafiz
Published: (2012)
A windowing-recursive approach for GPS real-time kinematic positioning
by: Zhou, Z., et al.
Published: (2010)
by: Zhou, Z., et al.
Published: (2010)
Similar Items
-
Digital forensic investigation reduction model (DIFReM) for Windows 10 OS
by: Shayau, Yazid Haruna
Published: (2018) -
A forensics acquisition method of WhatsApp data on Android smartphone
by: Muzakir, Ummu Khosyatillah
Published: (2018) -
HPC+Azure Environment for Bioinformatics Applications
by: Sidhu, Amandeep, et al.
Published: (2013) -
Windows 10 instant messaging application forensics
by: Shehu, Aliyu Usman
Published: (2018) -
Guideline for forensic analysis on windows XP and vista registry
by: Aghanvesi, Somayeh
Published: (2008)