Comprehensive analysis on hardware forensic for gambling machine
Hardware forensic analysis involves process of analyzing digital evidence derived from digital sources in order to facilitate and prove either the device is used to commit crime, contains evidence of crime or it is a target of crime. The digital evidence is analyzed to determine the type of informat...
| Main Author: | Magalingam, Pritheega |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2008
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/9458/ http://eprints.utm.my/9458/1/PritheegaMagalingamFSKSM2008.pdf |
Similar Items
Hardware configuration
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
A Novel Approach for Audio Watermarking
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Hardware pricing system / Lee Wee Cheng
by: Lee, Wee Cheng
Published: (2004)
by: Lee, Wee Cheng
Published: (2004)
Guideline for forensic analysis on windows XP and vista registry
by: Aghanvesi, Somayeh
Published: (2008)
by: Aghanvesi, Somayeh
Published: (2008)
Investigating computer forensic tools and their searching technique
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
Adapting Traceability in Digital Forensic Investigation Process
by: Selamat, S. R., et al.
Published: (2011)
by: Selamat, S. R., et al.
Published: (2011)
Energy efficiency of the bitcoin mining hardware and related blockchain technology
by: Noor Faiqah Izzati, Afandi
Published: (2018)
by: Noor Faiqah Izzati, Afandi
Published: (2018)
An integrated software-hardware exercise encouraging system / Kong Sibo
by: Kong , Sibo
Published: (2022)
by: Kong , Sibo
Published: (2022)
Hardware e-Inventory management system / Tan Kit Huang
by: Tan , Kit Huang
Published: (2003)
by: Tan , Kit Huang
Published: (2003)
An e-Commerce system for sales and purchase order management of machinery hardware / Tan Lian Kee
by: Tan, Lian Kee
Published: (2002)
by: Tan, Lian Kee
Published: (2002)
A Robust Firearm Identification Algorithm of Forensic Ballistics Specimens
by: Z. L., Chuan, et al.
Published: (2017)
by: Z. L., Chuan, et al.
Published: (2017)
A Comparative of Two-Dimensional Statistical Moment Invariants Features in Formulating an Automated Probabilistic Machine Learning Identification Algorithm for Forensic Application
by: Zun Liang, Chuan, et al.
Published: (2023)
by: Zun Liang, Chuan, et al.
Published: (2023)
Network forensics: detection and mitigation of botnet malicious code via darknet
by: R. Othman, R. Azrina, et al.
Published: (2012)
by: R. Othman, R. Azrina, et al.
Published: (2012)
Mobile device forensics: extracting and analysing data from an android-based smartphone
by: Abdul Aziz, Normaziah, et al.
Published: (2016)
by: Abdul Aziz, Normaziah, et al.
Published: (2016)
Feature engineering techniques to classify cause of death from forensic autopsy reports / Ghulam Mujtaba
by: Ghulam , Mujtaba
Published: (2018)
by: Ghulam , Mujtaba
Published: (2018)
A low-complexity, hardware architecture for a parametric, real-time LSF speech decoder
by: Mabrouk, Ahmed Hassan, et al.
Published: (2011)
by: Mabrouk, Ahmed Hassan, et al.
Published: (2011)
Forensic investigation of link fabrication attack in software defined networks / Suleman Khan
by: Suleman , Khan
Published: (2017)
by: Suleman , Khan
Published: (2017)
Single core hardware module to implement encryption in TECB mode
by: Reaz, M. B. I., et al.
Published: (2007)
by: Reaz, M. B. I., et al.
Published: (2007)
A comprehensive dataset for aspect-based sentiment analysis in evaluating teacher performance
by: Bhowmik, Abhijit, et al.
Published: (2023)
by: Bhowmik, Abhijit, et al.
Published: (2023)
Digital Forensic Automation Model For Online Social Networks
by: Arshad, Humaira
Published: (2019)
by: Arshad, Humaira
Published: (2019)
An evidence-based forensic taxonomy of Windows phone communication apps
by: Wahyu Cahyani, Niken Dwi, et al.
Published: (2018)
by: Wahyu Cahyani, Niken Dwi, et al.
Published: (2018)
A machine learning-based decision support tools for portfolio risk analysis
by: Tan, Kwee Hoe
Published: (2014)
by: Tan, Kwee Hoe
Published: (2014)
CDS523 – Forensic Analytics and Digital Investigations June 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
CDS523 – Forensic Analytics and Digital Investigations June 2019
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
PLS-SEM in Information Systems Research: A Comprehensive Methodological Reference
by: Al-Emran, Mostafa, et al.
Published: (2019)
by: Al-Emran, Mostafa, et al.
Published: (2019)
The Comprehension Theories Of Continuous Intention To Use Tel With E-Learning Models In Educations
by: Tawafak, Ragad M., et al.
Published: (2019)
by: Tawafak, Ragad M., et al.
Published: (2019)
A comprehensive study: Ant Colony Optimization (ACO) for Facility Layout Problem
by: Hasan, Raed Abdulkareem, et al.
Published: (2017)
by: Hasan, Raed Abdulkareem, et al.
Published: (2017)
Blockchain-enabled cybersecurity provision for scalable heterogeneous network: A comprehensive survey
by: Islam, Md. Shohidul, et al.
Published: (2024)
by: Islam, Md. Shohidul, et al.
Published: (2024)
Neural network and principle component analysis
based numerical data analysis for stock market
prediction with machine learning techniques
by: Islam, Mohammad Rabiul, et al.
Published: (2019)
by: Islam, Mohammad Rabiul, et al.
Published: (2019)
The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
Comparative analysis of machine learning models to predict common vulnerabilities and exposure
by: Shaesta Khan, Sheh Rahman, et al.
Published: (2024)
by: Shaesta Khan, Sheh Rahman, et al.
Published: (2024)
Rice Predictive Analysis Mechanism Utilizing Grey Wolf Optimizer-Least Squares Support Vector Machines
by: Zuriani, Mustaffa, et al.
Published: (2015)
by: Zuriani, Mustaffa, et al.
Published: (2015)
Email spam: A comprehensive review of optimize detection methods, challenges, and open research problems
by: Tusher, Ekramul Haque, et al.
Published: (2024)
by: Tusher, Ekramul Haque, et al.
Published: (2024)
Machine Learning Malware Detection For Android
by: Amir Muhammad Hafiz, Othman
Published: (2022)
by: Amir Muhammad Hafiz, Othman
Published: (2022)
A survey and analysis of feature selection techniques in machine learning for IoT device classification within smart buildings
by: Waseem, Quadri, et al.
Published: (2025)
by: Waseem, Quadri, et al.
Published: (2025)
Progressive kernel extreme learning machine for food image analysis via optimal features / Ghalib Ahmed Tahir
by: Ghalib Ahmed , Tahir
Published: (2022)
by: Ghalib Ahmed , Tahir
Published: (2022)
Comprehensive design and development of time efficiency speaker recognition model from front end to back end
by: Ahmad, Abdul Manan, et al.
Published: (2008)
by: Ahmad, Abdul Manan, et al.
Published: (2008)
Malware Detection In Android Using Machine Learning
by: Muhammad Hazriq Akmal, Zairol
Published: (2023)
by: Muhammad Hazriq Akmal, Zairol
Published: (2023)
Machine learning technique for phishing website detection
by: Nurul Amira, Mohd Zin, et al.
by: Nurul Amira, Mohd Zin, et al.
Computer Aided 3d Skull - 2d Photo Superimposition For Forensic Anthropology
by: Tan, Joi San
Published: (2017)
by: Tan, Joi San
Published: (2017)
Similar Items
-
Hardware configuration
by: Shah, Asadullah, et al.
Published: (2011) -
A Novel Approach for Audio Watermarking
by: Zamani, Mazdak, et al.
Published: (2009) -
Hardware pricing system / Lee Wee Cheng
by: Lee, Wee Cheng
Published: (2004) -
Guideline for forensic analysis on windows XP and vista registry
by: Aghanvesi, Somayeh
Published: (2008) -
Investigating computer forensic tools and their searching technique
by: Abdul Aziz, Normaziah, et al.
Published: (2011)