Adapting Traceability in Digital Forensic Investigation Process
Generally, the goals of digital forensic investigation process in a cyber crime are to identify the origin of the incident reported as well as maintaining the chain of custody so that the legal process can take its option. However, the traceability process has become a key or an important element of...
| Main Authors: | Selamat, S. R., Yusof, R., Sahib, S., Roslan, I., Abdollah, M. F., Mas'ud, M. Z. |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2011
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/162/ http://eprints.utem.edu.my/id/eprint/162/1/MUICET_2011_-_Adapting_Traceability_in_Digital_Forensic_Investigation_Process.pdf |
Similar Items
Traceability in Digital Forensic Investigation
Process
by: Selamat, S. R., et al.
Published: (2011)
by: Selamat, S. R., et al.
Published: (2011)
Mapping Process of Digital Forensic Investigation Framework
by: Selamat, S. R., et al.
Published: (2008)
by: Selamat, S. R., et al.
Published: (2008)
Tracing Technique for Blaster Attack
by: Selamat, S. R., et al.
Published: (2009)
by: Selamat, S. R., et al.
Published: (2009)
Scenario Based Worm Trace Pattern Identification Technique
by: Selamat, S. R., et al.
Published: (2010)
by: Selamat, S. R., et al.
Published: (2010)
Enhanced Alert Correlation Framework for Heterogeneous Log
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
Threshold Verification Technique for Network
Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Threshold verification using Statistical Approach for Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Collaborative Security Mechanism in Detecting Intrusion Activity
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Threshold verification using statistical approach for fast attack detection
by: Abdollah, Mohd Faizal, et al.
Published: (2009)
by: Abdollah, Mohd Faizal, et al.
Published: (2009)
CDS523 – Forensic Analytics and Digital Investigations June 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
CDS523 – Forensic Analytics and Digital Investigations June 2019
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
An Improved Traditional Worm Attack Pattern
by: Yusof, R., et al.
Published: (2010)
by: Yusof, R., et al.
Published: (2010)
An evaluation of traceability approaches to support software evolution
by: Rochimah, S., et al.
Published: (2007)
by: Rochimah, S., et al.
Published: (2007)
Digital forensics framework for investigating client cloud storage applications on smartphones
by: Daryabar, Farid
Published: (2015)
by: Daryabar, Farid
Published: (2015)
Digital forensics investigation framework for Raspberry Pi
by: Manavi, Sina
Published: (2015)
by: Manavi, Sina
Published: (2015)
Digital forensic investigation reduction model (DIFReM) for Windows 10 OS
by: Shayau, Yazid Haruna
Published: (2018)
by: Shayau, Yazid Haruna
Published: (2018)
A New Generic Taxonomy on Hybrid Malware Detection Technique
by: Yusof, R., et al.
Published: (2009)
by: Yusof, R., et al.
Published: (2009)
New Multi-step Worm Attack Model
by: Yusof, R., et al.
Published: (2010)
by: Yusof, R., et al.
Published: (2010)
A New Malware Attack Pattern Generalization
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
Advanced Trace Pattern For Computer Intrusion Discovery
by: Selamat, S. R., et al.
Published: (2010)
by: Selamat, S. R., et al.
Published: (2010)
Proposed intelligence systems based on digital Forensics : Review paper
by: Ismael Sahib, Hussein, et al.
Published: (2023)
by: Ismael Sahib, Hussein, et al.
Published: (2023)
A Visual Approach For Requirement Traceability
by: Madaki, Abdulkadir Ahmad
Published: (2022)
by: Madaki, Abdulkadir Ahmad
Published: (2022)
Statistical Approach for Validating Static Threshold in Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Host Based Detection Approach using Time Based
Module for Fast Attack Detection Behavior
by: Abdollah, M. F., et al.
Published: (2011)
by: Abdollah, M. F., et al.
Published: (2011)
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
CDS523 – Forensic Analytics and Digital Investigations
(Analitik Forensik dan Penyiasatan Digital) July/August 2021
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
Investigating computer forensic tools and their searching technique
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
Digital Forensic Automation Model For Online Social Networks
by: Arshad, Humaira
Published: (2019)
by: Arshad, Humaira
Published: (2019)
Recognizing P2P Botnets Characteristic Through TCP Distinctive Behaviour
by: Abdullah, Raihana Syahirah, et al.
Published: (2011)
by: Abdullah, Raihana Syahirah, et al.
Published: (2011)
Automated palm oil supply chain system with traceability
by: Rahman, Md. Arafatur, et al.
Published: (2021)
by: Rahman, Md. Arafatur, et al.
Published: (2021)
Method and tool to generate requirement traceability Matrix for scrum development methodology
by: Duraisamy, Gunavathi
Published: (2014)
by: Duraisamy, Gunavathi
Published: (2014)
Forecasting and tracking of project completion dateline using requirement traceability matrix in scrum
by: Tan, Eng Ian
Published: (2024)
by: Tan, Eng Ian
Published: (2024)
Implementation of Pharmaceutical Drug Traceability Using Blockchain Technology
by: Mohana, Muniandy, et al.
Published: (2019)
by: Mohana, Muniandy, et al.
Published: (2019)
Digital forensics subdomains: The state of the art and future directions
by: Al-Dhaqm, Arafat, et al.
Published: (2021)
by: Al-Dhaqm, Arafat, et al.
Published: (2021)
Mobile health applications digital evidence taxonomy with knowledge sharing approach for digital forensics readiness
by: Abdul Razak, Muhammad Thariq
Published: (2020)
by: Abdul Razak, Muhammad Thariq
Published: (2020)
Forensic investigation of link fabrication attack in software defined networks / Suleman Khan
by: Suleman , Khan
Published: (2017)
by: Suleman , Khan
Published: (2017)
Cloud computing and conflicts with digital forensic investigation
by: Damshenas, Mohsen, et al.
Published: (2013)
by: Damshenas, Mohsen, et al.
Published: (2013)
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013)
by: Dehghantanha, Ali, et al.
Published: (2013)
Network forensics: detection and mitigation of botnet malicious code via darknet
by: R. Othman, R. Azrina, et al.
Published: (2012)
by: R. Othman, R. Azrina, et al.
Published: (2012)
Meta-modeling constructs for requirements reuse (RR): software requirements patterns, variability, and traceability
by: Imam Yau'u, Badamasi, et al.
Published: (2018)
by: Imam Yau'u, Badamasi, et al.
Published: (2018)
Similar Items
-
Traceability in Digital Forensic Investigation
Process
by: Selamat, S. R., et al.
Published: (2011) -
Mapping Process of Digital Forensic Investigation Framework
by: Selamat, S. R., et al.
Published: (2008) -
Tracing Technique for Blaster Attack
by: Selamat, S. R., et al.
Published: (2009) -
Scenario Based Worm Trace Pattern Identification Technique
by: Selamat, S. R., et al.
Published: (2010) -
Enhanced Alert Correlation Framework for Heterogeneous Log
by: Yusof, R., et al.
Published: (2011)