Zobrazeno 1 - 10
of 23
pro vyhledávání: '"Shukor AB"'
Cyber Security Maturity Assessment Framework for Technology Startups: A Systematic Literature Review
Publikováno v:
IEEE Access, Vol 11, Pp 5442-5452 (2023)
Cybersecurity has gained increasing importance among firms of different sizes and industries due to the significant rise of cyber-attacks over time. Technology startups are particularly vulnerable to cyber-attacks due to the lack of cyber security me
Externí odkaz:
https://doaj.org/article/92ffb05b9da848acb0c17926009b1a31
Autor:
Adel Gohari, Anuar Bin Ahmad, Ruzairi Bin Abdul Rahim, A. S. M. Supa'at, Shukor Abd Razak, Mohammed Salih Mohammed Gismalla
Publikováno v:
IEEE Access, Vol 10, Pp 56611-56628 (2022)
Drones, or unmanned aerial vehicles (UAVs), are among the most beneficial and emerging technologies, with a wide range of applications that can support the sustainability concerns of smart cities and ultimately improve citizens’ quality of life. Th
Externí odkaz:
https://doaj.org/article/414a9b1781e84c9d8ddcddef3be82e86
Autor:
Arafat Al-Dhaqm, Richard Adeyemi Ikuesan, Victor R. Kebande, Shukor Abd Razak, George Grispos, Kim-Kwang Raymond Choo, Bander Ali Saleh Al-Rimy, Abdulrahman A. Alsewari
Publikováno v:
IEEE Access, Vol 9, Pp 152476-152502 (2021)
For reliable digital evidence to be admitted in a court of law, it is important to apply scientifically proven digital forensic investigation techniques to corroborate a suspected security incident. Mainly, traditional digital forensics techniques fo
Externí odkaz:
https://doaj.org/article/42e5dcde5c244180a3fced59c3e5f64d
Autor:
Arafat Al-dhaqm, Shukor Abd Razak, Siti Hajar Othman, Abdulalem Ali, Fuad A. Ghaleb, Arieff Salleh Rosman, Nurazmallail Marni
Publikováno v:
IEEE Access, Vol 8, Pp 48477-48490 (2020)
Database Forensic Investigation (DBFI) involves the identification, collection, preservation, reconstruction, analysis, and reporting of database incidents. However, it is a heterogeneous, complex, and ambiguous field due to the variety and multidime
Externí odkaz:
https://doaj.org/article/a501f1677c51477ba8896595296cbca3
Autor:
Arafat Al-Dhaqm, Shukor Abd Razak, David A. Dampier, Kim-Kwang Raymond Choo, Kamran Siddique, Richard Adeyemi Ikuesan, Abdulhadi Alqarni, Victor R. Kebande
Publikováno v:
IEEE Access, Vol 8, Pp 112846-112858 (2020)
Database forensic investigation (DBFI) is an important area of research within digital forensics. It's importance is growing as digital data becomes more extensive and commonplace. The challenges associated with DBFI are numerous, and one of the chal
Externí odkaz:
https://doaj.org/article/f451001e902e42f5a173ab388df24449
Publikováno v:
IEEE Access, Vol 8, Pp 43256-43264 (2020)
Data collection and storage in a large size is done on a routine basis in any company or organization. To this end, wireless network infrastructure and cloud computing are two widely-used tools. With the use of such services, less time is needed to a
Externí odkaz:
https://doaj.org/article/be9cb1fe223149f18675d825fb578a06
Autor:
Arafat Al-Dhaqm, Shukor Abd Razak, Richard Adeyemi Ikuesan, Victor R. Kebande, Kamran Siddique
Publikováno v:
IEEE Access, Vol 8, Pp 173359-173375 (2020)
Mobile Forensics (MF) field uses prescribed scientific approaches with a focus on recovering Potential Digital Evidence (PDE) from mobile devices leveraging forensic techniques. Consequently, increased proliferation, mobile-based services, and the ne
Externí odkaz:
https://doaj.org/article/fb8748199b51412cb5d8c5ab1c916f8f
Autor:
Arafat Al-Dhaqm, Shukor Abd Razak, Kamran Siddique, Richard Adeyemi Ikuesan, Victor R. Kebande
Publikováno v:
IEEE Access, Vol 8, Pp 145018-145032 (2020)
For every contact that is made in a database, a digital trace will potentially be left and most of the database breaches are mostly aimed at defeating the major security goals (Confidentiality, Integrity, and Authenticity) of data that reside in the
Externí odkaz:
https://doaj.org/article/dd930653dd814e41aa181f99a5927e71
Autor:
Innocent Uzougbo Onwuegbuzie, Shukor Abd Razak, Ismail Fauzi Isnin, Arafat Al-dhaqm, Nor Badrul Anuar
Publikováno v:
PLoS ONE, Vol 17, Iss 3 (2022)
Routing Protocol for Low-power and Lossy Networks (RPL), the de facto standard routing protocol for the Internet of Things (IoT) administers the smooth transportation of data packets across the Wireless Sensor Network (WSN). However, the mechanism fa
Externí odkaz:
https://doaj.org/article/cc81943d138b4be99a4dbae9e1c6a7a9
Autor:
Abdulalem Ali, Shukor Abd Razak, Siti Hajar Othman, Taiseer Abdalla Elfadil Eisa, Arafat Al-Dhaqm, Maged Nasser, Tusneem Elhassan, Hashim Elshafie, Abdu Saif
Publikováno v:
Applied Sciences, Vol 12, Iss 19, p 9637 (2022)
Financial fraud, considered as deceptive tactics for gaining financial benefits, has recently become a widespread menace in companies and organizations. Conventional techniques such as manual verifications and inspections are imprecise, costly, and t
Externí odkaz:
https://doaj.org/article/78b084d485ae4acb8424e89ac6852bad