Data wiping tool: ByteEditor Technique
This Wiping Tool is an anti-forensic tool that is built to wipe data permanently from laptop’s storage. This tool is capable to ensure the data from being recovered with any recovery tools. The objective of building this wiping tool is to maintain the confidentiality and integrity of the dat...
| Main Authors: | Ahmad Riduan, Nuraqilah Haidah, Mohd Foozy, Cik Feresa, A. Hamid, Isredza Rahmi Binti, Shamala, Palaniappan, Othman, Nur Fadzilah |
|---|---|
| Format: | Other |
| Language: | English |
| Published: |
IEEE
2021
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/6727/ http://eprints.uthm.edu.my/6727/1/P13677_9635dd84ccaba6a39f7e19f780afeca1.pdf |
Similar Items
Books, bytes and bridges: libraries and computer centers in academic institutions / Larry Hardesty (editor). (Book review)
by: Pinfield, Stephen
Published: (2001)
by: Pinfield, Stephen
Published: (2001)
A review of live survey application: Surveymonkey and surveygizmo
by: Abd Halim, Maisaarah, et al.
Published: (2018)
by: Abd Halim, Maisaarah, et al.
Published: (2018)
Customer profiling using classification approach for bank telemarketing
by: Palaniappan, Shamala, et al.
Published: (2017)
by: Palaniappan, Shamala, et al.
Published: (2017)
You tube spam comment detection using support vector machine and k–nearest neighbor
by: Aziz, Aqliima, et al.
Published: (2017)
by: Aziz, Aqliima, et al.
Published: (2017)
Network monitoring system to detect unauthorized connection
by: A Hamid, Isredza Rahmi, et al.
Published: (2017)
by: A Hamid, Isredza Rahmi, et al.
Published: (2017)
Suction controller for window wiping robot
by: Muhammad Zul Husaini, Noor Azmi
Published: (2009)
by: Muhammad Zul Husaini, Noor Azmi
Published: (2009)
Motion game : wipe out the bubbles
by: Teoh, Lip Ki
Published: (2010)
by: Teoh, Lip Ki
Published: (2010)
Classification of metamorphic virus using n-grams signatures
by: A Hamid, Isredza Rahmi, et al.
Published: (2020)
by: A Hamid, Isredza Rahmi, et al.
Published: (2020)
The one vice Coronavirus should wipe out
by: Hasan, Md. Mahmudul
Published: (2020)
by: Hasan, Md. Mahmudul
Published: (2020)
E-store management using bell-lapadula access control security model
by: Roslan, Saidah Nafisah, et al.
Published: (2018)
by: Roslan, Saidah Nafisah, et al.
Published: (2018)
Comparative analysis of data wiping technique for android using EXT4 file system
by: Mat Noh, Nurhanisah, et al.
Published: (2017)
by: Mat Noh, Nurhanisah, et al.
Published: (2017)
Evaluating the effectiveness for Wipe for Wildlife and its campaign elements
by: Ramkissoon, Haywantee, et al.
Published: (2014)
by: Ramkissoon, Haywantee, et al.
Published: (2014)
Information structure framework for ISMS planning and certification: Malaysian data
by: Shamala, Palaniappan, et al.
Published: (2018)
by: Shamala, Palaniappan, et al.
Published: (2018)
Youtube spam detection framework using naïve bayes and logistic regression
by: Nur’Ain Maulat, Samsudin, et al.
Published: (2019)
by: Nur’Ain Maulat, Samsudin, et al.
Published: (2019)
Youtube spam detection framework using naïve bayes and logistic regression
by: Maulat Samsudin, Nur’Ain, et al.
Published: (2019)
by: Maulat Samsudin, Nur’Ain, et al.
Published: (2019)
Digital Gold or Worthless Bytes? An Exploration of Bitcoin Price Fluctuations and Assessment of Event Driven Volatility
by: Manning Smith, James
Published: (2015)
by: Manning Smith, James
Published: (2015)
Boys’ love, byte-sized: a qualitative exploration of queer-themed microfiction in Chinese cyberspace
by: Shaw, Gareth
Published: (2017)
by: Shaw, Gareth
Published: (2017)
To the editor
by: Melloh, Markus, et al.
Published: (2013)
by: Melloh, Markus, et al.
Published: (2013)
Comparative study on RFID, hotspot and car plate scanning method : for intelligent parking management system
by: A.Hamid, Isredza Rahmi
Published: (2005)
by: A.Hamid, Isredza Rahmi
Published: (2005)
An immune system-inspired byte permutation function to improve confusion performance of round transformation in symmetric encryption scheme.
by: Ariffin, Suriyani, et al.
Published: (2012)
by: Ariffin, Suriyani, et al.
Published: (2012)
Editor's column
by: Quayum, Mohammad Abdul, et al.
Published: (2015)
by: Quayum, Mohammad Abdul, et al.
Published: (2015)
Editors Notes
by: Kinsella, John
Published: (2017)
by: Kinsella, John
Published: (2017)
Foreword by the editor
by: Davidson, David
Published: (2014)
by: Davidson, David
Published: (2014)
Editor's Notes
by: Chen, Julian
Published: (2022)
by: Chen, Julian
Published: (2022)
Editor's Introduction
by: Conlan, Chris
Published: (2004)
by: Conlan, Chris
Published: (2004)
Editor's Introduction
by: Oliver, Bobbie
Published: (2001)
by: Oliver, Bobbie
Published: (2001)
Letters: To the editor
by: O'Keeffe, M., et al.
Published: (2014)
by: O'Keeffe, M., et al.
Published: (2014)
Editor’s introduction
by: Keane, Michael
Published: (2011)
by: Keane, Michael
Published: (2011)
Letter to the editor
by: Melloh, Markus, et al.
Published: (2011)
by: Melloh, Markus, et al.
Published: (2011)
Editor's note
by: Tan, Zhai Yun
Published: (2022)
by: Tan, Zhai Yun
Published: (2022)
Guest Editor's Column
by: Abdul Wahid, Mohd Ridwan, et al.
Published: (2016)
by: Abdul Wahid, Mohd Ridwan, et al.
Published: (2016)
From the Editor's desk
by: Nguyen-Van-Tam, Jonathan S.
Published: (2015)
by: Nguyen-Van-Tam, Jonathan S.
Published: (2015)
Introduction: From the Editors
by: Gracy, K., et al.
Published: (2018)
by: Gracy, K., et al.
Published: (2018)
From the New Editor
by: Ong, Rachel
Published: (2017)
by: Ong, Rachel
Published: (2017)
Chief Editor Foreword
by: Doyle, Timothy
Published: (2017)
by: Doyle, Timothy
Published: (2017)
Note from the Editors
by: Bloch, Harry, et al.
Published: (2022)
by: Bloch, Harry, et al.
Published: (2022)
Letter to the editor - Response
by: Schofield, P., et al.
Published: (2011)
by: Schofield, P., et al.
Published: (2011)
Analysis of four historical ciphers against known plaintext frequency statistical attack
by: Wen, Chuah Chai, et al.
Published: (2018)
by: Wen, Chuah Chai, et al.
Published: (2018)
Note from the Guest Editor
by: Hibberd, Sarah
Published: (2015)
by: Hibberd, Sarah
Published: (2015)
WORDS FROM THE GUEST EDITORS
by: Teo, Kok Lay, et al.
Published: (2016)
by: Teo, Kok Lay, et al.
Published: (2016)
Similar Items
-
Books, bytes and bridges: libraries and computer centers in academic institutions / Larry Hardesty (editor). (Book review)
by: Pinfield, Stephen
Published: (2001) -
A review of live survey application: Surveymonkey and surveygizmo
by: Abd Halim, Maisaarah, et al.
Published: (2018) -
Customer profiling using classification approach for bank telemarketing
by: Palaniappan, Shamala, et al.
Published: (2017) -
You tube spam comment detection using support vector machine and k–nearest neighbor
by: Aziz, Aqliima, et al.
Published: (2017) -
Network monitoring system to detect unauthorized connection
by: A Hamid, Isredza Rahmi, et al.
Published: (2017)