Comparative analysis of data wiping technique for android using EXT4 file system
Data wiping is a useful technique which can prevent possible data recovery in a file system [1]. All the data in the file system will be permanently deleted by using this technique. In a forensics field, data wiping is so important because it can avoid risking sensitive data falling into the wrong h...
| Main Authors: | Mat Noh, Nurhanisah, Mohamad, Kamaruddin Malik |
|---|---|
| Other Authors: | Ibrahim, Rosziati |
| Format: | Book Section |
| Language: | English |
| Published: |
Penerbit UTHM
2017
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/4351/ http://eprints.uthm.edu.my/4351/1/Chapter%207_DEISS_S1.pdf |
Similar Items
Comparative analysis of digital artifact persistence between file format
by: Saari, Anati Dalila, et al.
Published: (2017)
by: Saari, Anati Dalila, et al.
Published: (2017)
Comparative analysis of spatio/spectro-temporal data modelling techniques
by: Abdullah, Mohd Hafizul Afifi, et al.
Published: (2017)
by: Abdullah, Mohd Hafizul Afifi, et al.
Published: (2017)
Comparisons of seam carving detection techniques for digital images
by: Onn, Nur Amanina, et al.
Published: (2017)
by: Onn, Nur Amanina, et al.
Published: (2017)
Comparitive gait analysis for criminal investigation using leave bag behind technique
by: Zainol, Norfazilah, et al.
Published: (2017)
by: Zainol, Norfazilah, et al.
Published: (2017)
An improved DDoS detection using hybrid N-Gram heuristic technique
by: Maslan, Andi, et al.
Published: (2017)
by: Maslan, Andi, et al.
Published: (2017)
Pembangunan aplikasi mudahalih android “Moneytracker"
by: Nathan, Shelena Soosay, et al.
Published: (2017)
by: Nathan, Shelena Soosay, et al.
Published: (2017)
Comparative analysis of gamification approaches in education
by: Ahmad Fuadi, Nur Faizura, et al.
Published: (2017)
by: Ahmad Fuadi, Nur Faizura, et al.
Published: (2017)
Comparative analysis of firefly algorithm for solving optimization problems
by: Wahid, Fazli, et al.
Published: (2017)
by: Wahid, Fazli, et al.
Published: (2017)
Pembangunan aplikasi android untuk mempelajari tulisan jawi secara M-learning
by: Mohamed Ali @ Md Hani, Mohd Hatta, et al.
Published: (2017)
by: Mohamed Ali @ Md Hani, Mohd Hatta, et al.
Published: (2017)
A new hybrid evolutionary algorithm with MCDM for plant forecasting using FIS
by: Nasir, Januardi, et al.
Published: (2017)
by: Nasir, Januardi, et al.
Published: (2017)
Performance analysis of SWOT suite toolkit on Inter-domain and Intra-domain Web of Things
by: Anuar, Nur Ameera, et al.
Published: (2017)
by: Anuar, Nur Ameera, et al.
Published: (2017)
Capabilities of Native XML and Flat File Systems for Document Management
by: Mazlyda, Abdul Rahman
Published: (2004)
by: Mazlyda, Abdul Rahman
Published: (2004)
E-filing users’ satisfaction: A study on Malaysia petroleum upstream taxpayers
by: Jaimin, Hairul Salveson
Published: (2020)
by: Jaimin, Hairul Salveson
Published: (2020)
Assessing the diffusion of E-Filing for tax compliance among Small and Medium Enterprises (SMEs) in Malaysia
by: Nuraisyah Fitrie, Abdullah@Abd Jalil
Published: (2023)
by: Nuraisyah Fitrie, Abdullah@Abd Jalil
Published: (2023)
Conceptual model of persuasive multimedia content (PMC) for social media advertising of island homestays
by: Muhammad Abdul Malik, Saedon
Published: (2019)
by: Muhammad Abdul Malik, Saedon
Published: (2019)
Data redundancy reduction scheme for data aggregation in wireless sensor network
by: Adawy, Mohammad Ibrahim
Published: (2020)
by: Adawy, Mohammad Ibrahim
Published: (2020)
Data Transformation Model For Addressing Incomplete And Inconsistent Quality Issues Of Big Data
by: Onyeabor, Grace Amina
Published: (2024)
by: Onyeabor, Grace Amina
Published: (2024)
Text representation using canonical data model
by: Hadi, Hiba Jasim
Published: (2016)
by: Hadi, Hiba Jasim
Published: (2016)
Repetitive mutations in genetic algorithm for software test data generations
by: Kadhim, Mohammed Majid
Published: (2022)
by: Kadhim, Mohammed Majid
Published: (2022)
A Combination Between the Employment Service Technique and the Electronic Customer Relationship Management (ECRM)
by: Bany Baker, Mohammad Abdel Qader
Published: (2012)
by: Bany Baker, Mohammad Abdel Qader
Published: (2012)
A study of feature exraction techniques for classifying topics and sentiments from news posts
by: Al-Dyani, Wafa Zubair Abdullah
Published: (2014)
by: Al-Dyani, Wafa Zubair Abdullah
Published: (2014)
Resource allocation technique for powerline network using a modified shuffled frog-leaping algorithm
by: Altrad, Abdallah Mahmoud Mousa
Published: (2018)
by: Altrad, Abdallah Mahmoud Mousa
Published: (2018)
Model Reka Bentuk Konseptual Operasian Storan Data Bagi Aplikasi Kepintaran Perniagaan
by: Muhamad Shahbani, Abu Bakar
Published: (2012)
by: Muhamad Shahbani, Abu Bakar
Published: (2012)
Performance evaluation of caching placement algorithms in named data network for video on demand service
by: Abbas, Rasha Salem
Published: (2016)
by: Abbas, Rasha Salem
Published: (2016)
Producer mobility support scheme for indirection-based mobility approach in named data networking
by: Hussaini, Muktar
Published: (2020)
by: Hussaini, Muktar
Published: (2020)
Enhancing the security of RCIA ultra-lightweight
authentication protocol by using random number generator (RNG) technique
by: Yasear, Shaymah Akram
Published: (2015)
by: Yasear, Shaymah Akram
Published: (2015)
A Hybridized Model Of Spatial Presense And Guided-Imagery Therapy Technique For Image-Based Virtual Reality In Self-Therapy
by: Mohd Fairuz, Zaiyadi
Published: (2024)
by: Mohd Fairuz, Zaiyadi
Published: (2024)
An integrated model for predicting users’ continuance intention towards using open government data in Qatar state
by: Al-Jamili, Omar Naji Mohammed
Published: (2023)
by: Al-Jamili, Omar Naji Mohammed
Published: (2023)
Development of industrial training assessment system (iTAS) 2.0: a step forward to educator 4.0
by: Mohd Hanifa, Rafizah, et al.
Published: (2020)
by: Mohd Hanifa, Rafizah, et al.
Published: (2020)
AGW 616 - MANAGEMENT INFORMATION SYSTEM APRIL 08.
by: PPP, Pusat Pengajian Pengurusan
Published: (2008)
by: PPP, Pusat Pengajian Pengurusan
Published: (2008)
Kajian Terhadap Proses Penjanaan Pengetahuan Dalam Kaedah - Kaedah Pengajaran Ekspositori Dan Pembelajaran Berasaskan Masalah Berbantukan Sistem Pengurusan Pembelajaran
by: Ahmad, Mazida
Published: (2010)
by: Ahmad, Mazida
Published: (2010)
CSK202 - TEKNOLOGI MAKLUMAT - OKT-NOVEMBER 1992.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1992)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1992)
Himpunan Modul TMK Untuk Sekolah Siri 2
by: Abu Ziden, Azidah, et al.
Published: (2016)
by: Abu Ziden, Azidah, et al.
Published: (2016)
Network device ad-blocker
by: Mohamad, Juhaina, et al.
Published: (2020)
by: Mohamad, Juhaina, et al.
Published: (2020)
Poket Musafir: a guide for smart muslim travelers
by: Mohd Hanifa, Rafizah, et al.
Published: (2020)
by: Mohd Hanifa, Rafizah, et al.
Published: (2020)
Shooter’s personal performance application
by: Hanip, Muhammad Izzul, et al.
Published: (2020)
by: Hanip, Muhammad Izzul, et al.
Published: (2020)
1001 resipi: laman web perkongsian resipi
by: Pau, Nazrin Seng Kiat, et al.
Published: (2020)
by: Pau, Nazrin Seng Kiat, et al.
Published: (2020)
Titanium dioxide film based photocatalytic application for degradation of dyes
by: Abd Hamed, Noor Kamalia, et al.
Published: (2019)
by: Abd Hamed, Noor Kamalia, et al.
Published: (2019)
Analysis of four historical ciphers against known plaintext frequency statistical attack
by: Wen, Chuah Chai, et al.
Published: (2018)
by: Wen, Chuah Chai, et al.
Published: (2018)
Creating a GUI solver for linear programming models in MATLAB
by: Siaw, Chong Lee, et al.
Published: (2018)
by: Siaw, Chong Lee, et al.
Published: (2018)
Similar Items
-
Comparative analysis of digital artifact persistence between file format
by: Saari, Anati Dalila, et al.
Published: (2017) -
Comparative analysis of spatio/spectro-temporal data modelling techniques
by: Abdullah, Mohd Hafizul Afifi, et al.
Published: (2017) -
Comparisons of seam carving detection techniques for digital images
by: Onn, Nur Amanina, et al.
Published: (2017) -
Comparitive gait analysis for criminal investigation using leave bag behind technique
by: Zainol, Norfazilah, et al.
Published: (2017) -
An improved DDoS detection using hybrid N-Gram heuristic technique
by: Maslan, Andi, et al.
Published: (2017)