Traceability in Digital Forensic Investigation Process
Digital forensic is part of forensic science that implicitly covers crime that is related to computer technology. In a cyber crime, digital evidence investigation requires a special procedures and techniques in order to be used and be accepted in court of law. Generally, the goals of these speci...
| Main Authors: | Selamat, S. R., Yusof, R., Sahib, S., Abdollah, M. F., Hassan, N. H., Zainal Abidin, Z. |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2011
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/254/ http://eprints.utem.edu.my/id/eprint/254/1/06079259.pdf |
Similar Items
Adapting Traceability in Digital Forensic Investigation Process
by: Selamat, S. R., et al.
Published: (2011)
by: Selamat, S. R., et al.
Published: (2011)
Mapping Process of Digital Forensic Investigation Framework
by: Selamat, S. R., et al.
Published: (2008)
by: Selamat, S. R., et al.
Published: (2008)
Advanced Trace Pattern For Computer Intrusion Discovery
by: Selamat, S. R., et al.
Published: (2010)
by: Selamat, S. R., et al.
Published: (2010)
Alert Correlation Technique Analysis For Diverse Log
by: Yusof, R., et al.
Published: (2008)
by: Yusof, R., et al.
Published: (2008)
Multifaceted approached in gerating and recovering requirement traceability
by: Siti Rochimah, Siti Rochimah, et al.
Published: (2007)
by: Siti Rochimah, Siti Rochimah, et al.
Published: (2007)
Enhanced Alert Correlation Framework for Heterogeneous Log
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
Threshold Verification Technique for Network
Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Threshold verification using Statistical Approach for Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Collaborative Security Mechanism in Detecting Intrusion Activity
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Network Administration & Management
by: Yusof, R., et al.
Published: (2007)
by: Yusof, R., et al.
Published: (2007)
An Improved Traditional Worm Attack Pattern
by: Yusof, R., et al.
Published: (2010)
by: Yusof, R., et al.
Published: (2010)
Host Based Detection Approach using Time Based
Module for Fast Attack Detection Behavior
by: Abdollah, M. F., et al.
Published: (2011)
by: Abdollah, M. F., et al.
Published: (2011)
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
A New Malware Attack Pattern Generalization
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
A New Generic Taxonomy on Hybrid Malware Detection Technique
by: Yusof, R., et al.
Published: (2009)
by: Yusof, R., et al.
Published: (2009)
New Multi-step Worm Attack Model
by: Yusof, R., et al.
Published: (2010)
by: Yusof, R., et al.
Published: (2010)
Scenario Based Worm Trace Pattern Identification Technique
by: Selamat, S. R., et al.
Published: (2010)
by: Selamat, S. R., et al.
Published: (2010)
Cloud computing and conflicts with digital forensic investigation
by: Damshenas, Mohsen, et al.
Published: (2013)
by: Damshenas, Mohsen, et al.
Published: (2013)
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013)
by: Dehghantanha, Ali, et al.
Published: (2013)
Digital forensics investigation framework for Raspberry Pi
by: Manavi, Sina
Published: (2015)
by: Manavi, Sina
Published: (2015)
Statistical Approach for Validating Static Threshold in Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Digital Forensics Investigation Frameworks for Cloud
Computing and Internet of Things
by: Pichan, Ameer
Published: (2022)
by: Pichan, Ameer
Published: (2022)
CDS523 – Forensic Analytics and Digital Investigations June 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
CDS523 – Forensic Analytics and Digital Investigations June 2019
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
Recognizing P2P Botnets Characteristic Through TCP Distinctive Behaviour
by: Abdullah, Raihana Syahirah, et al.
Published: (2011)
by: Abdullah, Raihana Syahirah, et al.
Published: (2011)
Feature Selection for Detecting Fast Attack in Network Intrusion Detection
by: Abdollah, M. F., et al.
Published: (2008)
by: Abdollah, M. F., et al.
Published: (2008)
Intrusion Alert Correlation Technique Analysis for Heterogeneous Log
by: Yusof, R., et al.
Published: (2008)
by: Yusof, R., et al.
Published: (2008)
A review on mobile device's digital forensic process models
by: Farjamfar, Anahita, et al.
Published: (2014)
by: Farjamfar, Anahita, et al.
Published: (2014)
Digital forensics trends and future
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013)
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013)
Proposed intelligence systems based on digital Forensics : Review paper
by: Ismael Sahib, Hussein, et al.
Published: (2023)
by: Ismael Sahib, Hussein, et al.
Published: (2023)
Digital forensics framework for investigating client cloud storage applications on smartphones
by: Daryabar, Farid
Published: (2015)
by: Daryabar, Farid
Published: (2015)
Revisiting a summer vacation: digital restoration and typesetter forensics
by: Bagley, Steven R., et al.
Published: (2013)
by: Bagley, Steven R., et al.
Published: (2013)
An investigation of adoption intention of halal traceability system among food SMEs
by: Kamarulzaman, Nitty Hirawaty, et al.
Published: (2021)
by: Kamarulzaman, Nitty Hirawaty, et al.
Published: (2021)
An evaluation of traceability approaches to support software evolution
by: Rochimah, S., et al.
Published: (2007)
by: Rochimah, S., et al.
Published: (2007)
A generic smartphone forensic investigation process model
by: Farjamfar, Anahita
Published: (2016)
by: Farjamfar, Anahita
Published: (2016)
Application of forensic entomology in crime scene investigations in Malaysia / Kavitha Rajagopal
by: Rajagopal, Kavitha
Published: (2013)
by: Rajagopal, Kavitha
Published: (2013)
Digital forensics: defining an education agenda
by: Nance, K., et al.
Published: (2010)
by: Nance, K., et al.
Published: (2010)
A survey on digital forensics trends
by: Dehghantanha, Ali, et al.
Published: (2014)
by: Dehghantanha, Ali, et al.
Published: (2014)
Digital forensic investigation reduction model (DIFReM) for Windows 10 OS
by: Shayau, Yazid Haruna
Published: (2018)
by: Shayau, Yazid Haruna
Published: (2018)
Critical shortfalls in vape liquid traceability
by: Look, Keyun, et al.
Published: (2023)
by: Look, Keyun, et al.
Published: (2023)
Similar Items
-
Adapting Traceability in Digital Forensic Investigation Process
by: Selamat, S. R., et al.
Published: (2011) -
Mapping Process of Digital Forensic Investigation Framework
by: Selamat, S. R., et al.
Published: (2008) -
Advanced Trace Pattern For Computer Intrusion Discovery
by: Selamat, S. R., et al.
Published: (2010) -
Alert Correlation Technique Analysis For Diverse Log
by: Yusof, R., et al.
Published: (2008) -
Multifaceted approached in gerating and recovering requirement traceability
by: Siti Rochimah, Siti Rochimah, et al.
Published: (2007)