Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics
The increasing number of cyber crimes has motivated network forensics researchers to develop new techniques to analyze and investigate these crimes. Although cyber crimes produce a large volume of evidence, analyzing and measuring the extent of the damages caused by these crimes are difficult becaus...
| Main Author: | Mosa, Mohammad Rasmi Hassun |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2013
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/43822/ http://eprints.usm.my/43822/1/Mohammad%20Rasmi%20Hassun%20Mosa24.pdf |
Similar Items
Computer Aided 3d Skull - 2d Photo Superimposition For Forensic Anthropology
by: Tan, Joi San
Published: (2017)
by: Tan, Joi San
Published: (2017)
ICMPv6 Echo Request Ddos Attack Detection Framework Using Backpropagation Neural Network
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
Digital Forensic Automation Model For Online Social Networks
by: Arshad, Humaira
Published: (2019)
by: Arshad, Humaira
Published: (2019)
Quantitative image morphology
by: Sagar, , BSD, et al.
Published: (2003)
by: Sagar, , BSD, et al.
Published: (2003)
CDS523 – Forensic Analytics and Digital Investigations June 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
CDS523 – Forensic Analytics and Digital Investigations June 2019
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
A Simple Data Dependency Analyzer For C Programs.
by: Sodhy, Gian Chand, et al.
Published: (2002)
by: Sodhy, Gian Chand, et al.
Published: (2002)
Related-mode attacks on block cipher modes of operation
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Novel Technology Smartal Exploring The Student Problem Analyzer For Mathematics Module
by: Umar, Siti Noor Arfah
Published: (2009)
by: Umar, Siti Noor Arfah
Published: (2009)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
Approach for solving active perturbation attack problem in stepping stone detection.
by: Omar, Mohd Nizam
Published: (2011)
by: Omar, Mohd Nizam
Published: (2011)
Security attacks taxonomy on bring your own devices (BYOD) model
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)
Attacks on SVD-Based watermarking schemes
by: Huo-Chong, Ling, et al.
Published: (2008)
by: Huo-Chong, Ling, et al.
Published: (2008)
Identifying And Classifying Unknown Words In Malay Texts.
by: Bali, Ranaivo-Malançon, et al.
Published: (2007)
by: Bali, Ranaivo-Malançon, et al.
Published: (2007)
CDS523 – Forensic Analytics and Digital Investigations
(Analitik Forensik dan Penyiasatan Digital) July/August 2021
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
by: Khor, Kok Chin, et al.
Published: (2012)
by: Khor, Kok Chin, et al.
Published: (2012)
Using fuzzy logic to identify significant factors of negotiation performance
by: Tameur, Nachef
Published: (2013)
by: Tameur, Nachef
Published: (2013)
Identifying Criteria For The Implementation Of Augmented Reality In Malaysian Tourism Industry
by: Ahmed, Abdul Salam Waqar
Published: (2022)
by: Ahmed, Abdul Salam Waqar
Published: (2022)
Attacks on a robust watermarking scheme based on self-reference image
by: TING, G, et al.
Published: (2008)
by: TING, G, et al.
Published: (2008)
CMT 315 - COMPUTER GRAPHICS & VISUAL COMPUTING OKT 04
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
CMT324 – Computer Graphics & Visual Computing January 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001
by: Ling, Huo-Chong, et al.
Published: (2007)
by: Ling, Huo-Chong, et al.
Published: (2007)
CMT 324-CMT 315 - COMPUTER GRAPHICS & VISUAL COMPUTING APRIL 08.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
CMT324 – COMPUTER GRAPHICS & VISUAL COMPUTING [GRAFIK KOMPUTER & PERKOMPUTERAN VISUAL]
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2017)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2017)
CMT324–Computer Graphics & Visual Computing (December 2019 / January 2020)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2020)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2020)
CMT324 – Computer Graphics & Visual Computing (Grafik Komputer & Perkomputeran Visual)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
Off-line keyword guessing attacks on recent Public Key Encryption with Keyword Search Schemes
by: Wei-Chuen, Yau, et al.
Published: (2008)
by: Wei-Chuen, Yau, et al.
Published: (2008)
CPC354 – Computer Graphics & Visualization (Grafik Komputer & Visualisasi) CMT324 - Computer Graphics and Visual Computing (Grafik Komputer dan Perkomputeran Visual) - February/March 2022
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
CMT324 – COMPUTER GRAPHICS & VISUAL COMPUTING [GRAFIK KOMPUTER & PERKOMPUTERAN VISUAL] DEC. 2014 - JAN. 2015
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2015)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2015)
CMT324 – COMPUTER GRAPHICS & VISUAL COMPUTING [GRAFIK KOMPUTER & PERKOMPUTERAN VISUAL] DEC. 2015 - JAN. 2016
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2016)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2016)
A Framework For Detecting Bluetooth Mobile Worms.
by: Sarwar, Usman, et al.
Published: (2007)
by: Sarwar, Usman, et al.
Published: (2007)
Framework To Enhance Veracity And Quality Of Big Data
by: Ridzuan, Fakhitah
Published: (2021)
by: Ridzuan, Fakhitah
Published: (2021)
Concept And Relation Extraction Framework For Ontology Learning
by: Al-Aswadi, Fatima Nadeem Salem
Published: (2023)
by: Al-Aswadi, Fatima Nadeem Salem
Published: (2023)
Ethical Framework On Breast Self-Examination System
by: Khana, Rajes
Published: (2022)
by: Khana, Rajes
Published: (2022)
Enhanced Automated Framework For Cattle Tracking And Classification
by: Williams, Bello Rotimi
Published: (2022)
by: Williams, Bello Rotimi
Published: (2022)
A Neural Network-Based Application to Identify Cubic Structures in Multi Component Crystalline Materials Using X-Ray Diffraction Data.
by: Syukur, Mohammad, et al.
Published: (2007)
by: Syukur, Mohammad, et al.
Published: (2007)
High-level language and compiler for reconfigurable computing
by: Hiew,, FS, et al.
Published: (2004)
by: Hiew,, FS, et al.
Published: (2004)
Computation of cryptographic keys from face biometrics
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
CST 101- COMPUTER ORGANIZATION OKT 04
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
CST131 - COMPUTER ORGANISATION JUNE 2008.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
Similar Items
-
Computer Aided 3d Skull - 2d Photo Superimposition For Forensic Anthropology
by: Tan, Joi San
Published: (2017) -
ICMPv6 Echo Request Ddos Attack Detection Framework Using Backpropagation Neural Network
by: Mohammed Ahmed Saad, Redhwan
Published: (2016) -
Digital Forensic Automation Model For Online Social Networks
by: Arshad, Humaira
Published: (2019) -
Quantitative image morphology
by: Sagar, , BSD, et al.
Published: (2003) -
CDS523 – Forensic Analytics and Digital Investigations June 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)