Zobrazeno 1 - 10
of 45
pro vyhledávání: '"Kamaruddin Malik Mohamad"'
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 33, Iss 1, Pp 21-32 (2021)
Digital forensic aims to provide an assistance for making decisions about a crime by looking at a file content which usually involves image files such as GIF, BMP, JPEG and etc. JPEG is a very popular image file format. It has less structured content
Externí odkaz:
https://doaj.org/article/eca0a08e350246f38279a9215e2e9428
Autor:
Abdulrahman Aminu Ghali, Sapiee Jamel, Kamaruddin Malik Mohamad, Nasir Abubakar Yakub, Mustafa Mat Deris
Publikováno v:
JOIV: International Journal on Informatics Visualization, Vol 1, Iss 4-2, Pp 175-178 (2017)
With the prominent needs for security and reliable mode of identification in biometric system. Iris recognition has become reliable method for personal identification nowadays. The system has been used for years in many commercial and government appl
Externí odkaz:
https://doaj.org/article/2b5e5f82644e42079a58135e16bf2c8a
Publikováno v:
Bulletin of Electrical Engineering and Informatics. 10:1015-1023
The computation of the optimal path is one of the critical problems in graph theory. It has been utilized in various practical ranges of real world applications including image processing, file carving and classification problem. Numerous techniques
Publikováno v:
Advances on Smart and Soft Computing ISBN: 9789811560477
Malaysian Public Sector (MPS) organizations span laterally within all ten critical sectors outlined in the National Cybersecurity Policy (NCSP). Critical Information Infrastructure Protection (CIIP) initiatives are mainly driven by the overarching NC
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ef48ac5fbbe73d30eaf4f8f66cad6666
https://doi.org/10.1007/978-981-15-6048-4_32
https://doi.org/10.1007/978-981-15-6048-4_32
Publikováno v:
2020 8th International Conference on Information Technology and Multimedia (ICIMU).
This paper reports preliminary findings on the Malaysian Public Sector Critical Information Infrastructure Protection (MPS CIIP) Framework development. Malaysia Public Sector (MPS) requires sectoral references in the form of directive and guidelines
Publikováno v:
TELKOMNIKA (Telecommunication Computing Electronics and Control). 20:61
Distributeddenial of service (DDoS) attacks have always been a concern of cyber experts. To detect DDoS attacks, several methods can be used. One of the methods used in this research is the n-gram technique. The n-gram approach analyzes the payload o
Autor:
Khalid Eisa Haidar Abdalla Alhosani, Kamaruddin Malik Mohamad, Shamsul Kamal Ahmad Khalid, Noor Azah Samsudin, Sapiee Jamel
Publikováno v:
2019 IEEE Conference on Application, Information and Network Security (AINS).
As companies continue to invest in information security, human weaknesses continue to remain a root cause of data breaches in organisations. Several security models have been proposed in the literature but largely remain ineffective at addressing thi
Publikováno v:
International Journal of Digital Crime and Forensics. 8:63-84
Many studies have been conducted in addressing problem of fragmented JPEG. However, carving fragmented JPEG files are not easy to solve due to the complexity of determining the fragmentation point. In this article, X_myKarvee framework is introduced
Publikováno v:
Journal of Physics: Conference Series. 1529:052011
Digital Forensics is a platform that helps in assisting investigation carried out in computer crimes through the recovery of material that is found in digital devices. Material is recovered through a method known as file carving that helps to recover
Publikováno v:
IAES International Journal of Artificial Intelligence (IJ-AI). 9:137
Computer system security is a factor that needs to be considered in the era of industrial revolution 4.0, namely by preventing various threats to the system, as well as being able to detect and repair any damage that occurs to the computer system. DD