A model for validation and verification of disk imaging in computer forensic investigation
In digital forensic investigation practices, there are numerous digital forensics preservation tools that have been used by practitioners all over the world. Tool development continues as the practitioner’s demands increases. It is important to have right specialized tools in order to ensure that al...
| Main Author: | Palaniappan, P. Siva Shamala |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/11504/1/PSivaShamalaMFSKSM2009.pdf |
Similar Items
Open source forensic tools for linux hard disk investigation
by: Amin Maree, Bashar (Moh'd Walid)
Published: (2010)
by: Amin Maree, Bashar (Moh'd Walid)
Published: (2010)
Modeling activity diagram to colored petri net for validation and verification based on non functional parameters
by: Balagatabi, Hossein Nematzadeh
Published: (2008)
by: Balagatabi, Hossein Nematzadeh
Published: (2008)
Modelling UML activity diagram to colored petri net for validation and verification based on non functional parameters
by: Balagatabi, Hossein Nematzadeh
Published: (2008)
by: Balagatabi, Hossein Nematzadeh
Published: (2008)
Simplified database forensic investigation using metamodeling approach
by: Al-Dhaqm, Arafat Mohammed Rashad
Published: (2019)
by: Al-Dhaqm, Arafat Mohammed Rashad
Published: (2019)
Online signature verification using probabilistic modeling and neural network
by: Mohamed Ahsan , Amin
Published: (2010)
by: Mohamed Ahsan , Amin
Published: (2010)
Forensic analysis on mobile phone
by: Lee, Chuw Fan
Published: (2008)
by: Lee, Chuw Fan
Published: (2008)
Stroke-to-stroke matching in on-line signature verification
by: Ahmad Jaini, Azhar
Published: (2010)
by: Ahmad Jaini, Azhar
Published: (2010)
Digital forensics adoption model for Malaysian Law Enforcement Agencies (MLEAs)
by: Mat Kamal, Siti Nuur-Ila
Published: (2019)
by: Mat Kamal, Siti Nuur-Ila
Published: (2019)
Fusion features ensembling models using Siamese convolutional neural network for kinship verification
by: Mohammed Ali, Al Muashi
Published: (2021)
by: Mohammed Ali, Al Muashi
Published: (2021)
Online signature verification based on dynamic feature discriminators
by: Omar, Nazaruddin
Published: (2009)
by: Omar, Nazaruddin
Published: (2009)
Two-dimensional barcodes for hardcopy document integrity verification
by: Teoh, Chin Yew
Published: (2008)
by: Teoh, Chin Yew
Published: (2008)
Comprehensive analysis on hardware forensic for gambling machine
by: Magalingam, Pritheega
Published: (2008)
by: Magalingam, Pritheega
Published: (2008)
Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
Computer Aided 3d Skull - 2d Photo Superimposition For Forensic Anthropology
by: Tan, Joi San
Published: (2017)
by: Tan, Joi San
Published: (2017)
Enhanced forensic process model in cloud environment
by: Moussa, Ahmed Nour
Published: (2018)
by: Moussa, Ahmed Nour
Published: (2018)
Guideline for forensic analysis on windows XP and vista registry
by: Aghanvesi, Somayeh
Published: (2008)
by: Aghanvesi, Somayeh
Published: (2008)
A digital forensic readiness components for operational unit
by: Mohammed Saleh, Abdulalem Ali
Published: (2013)
by: Mohammed Saleh, Abdulalem Ali
Published: (2013)
Account verification to prevent malicious users access in web-based forums
by: Tabar, Mahdi Taheri
Published: (2013)
by: Tabar, Mahdi Taheri
Published: (2013)
Registration verification using image of an object / Sabariah Rawi
by: Rawi, Sabariah
Published: (2007)
by: Rawi, Sabariah
Published: (2007)
Enhanced 3-Tier Storage Management Scheme For Flash Memory-Based Solid State Disk
by: Alsalibi, Ahmed I N
Published: (2017)
by: Alsalibi, Ahmed I N
Published: (2017)
Digital Forensic Automation Model For Online Social Networks
by: Arshad, Humaira
Published: (2019)
by: Arshad, Humaira
Published: (2019)
The practical analysis towards developing a guideline for the Xbox 360 forensic
by: Mohd. Isa, Hairul Azni
Published: (2009)
by: Mohd. Isa, Hairul Azni
Published: (2009)
Redesign, optimization and validation of keyseat
by: Muttaqin, Hilman
Published: (2008)
by: Muttaqin, Hilman
Published: (2008)
Offline signature verification using ordinal structure fuzzy logic and integrated features based on single signature
by: Abdulfattah, Ghassan Marwan
Published: (2019)
by: Abdulfattah, Ghassan Marwan
Published: (2019)
Computer model on linear wave propagation
by: Ling, How Ing
Published: (2013)
by: Ling, How Ing
Published: (2013)
Digital forensic data collection in cloud computing using logic model
by: Khairul Afandy Abu Bakar
Published: (2012)
by: Khairul Afandy Abu Bakar
Published: (2012)
Labeling algorithm for validation of 2D line drawing
by: Mardzuki, Samihah
Published: (2011)
by: Mardzuki, Samihah
Published: (2011)
A unified trust model for pervasive computing environment
by: Khiabani, Hamed
Published: (2013)
by: Khiabani, Hamed
Published: (2013)
Validation Of Quality Requirements Through Requirements-Based Testing With Semi-Formalised Model
by: Moketar, Nor Aiza
Published: (2018)
by: Moketar, Nor Aiza
Published: (2018)
Investigating computational thinking among primary school students in Terengganu using visual programming
by: Osmanullrazi, Abdullah
Published: (2022)
by: Osmanullrazi, Abdullah
Published: (2022)
Adaptive learning model for learning computational thinking through educational robotic
by: Jamal, Nurul Nazihah
Published: (2021)
by: Jamal, Nurul Nazihah
Published: (2021)
Development of research trends evolution model for computer science for Malaysian publication
by: Md. Nadzar, Nurul Mardhiah Azura
Published: (2022)
by: Md. Nadzar, Nurul Mardhiah Azura
Published: (2022)
Image binarization of historical document image
by: Mat Som, Hafizan
Published: (2007)
by: Mat Som, Hafizan
Published: (2007)
A modified computational model of ant colony system in DNA sequence design
by: Mustaza, Seri Mastura
Published: (2012)
by: Mustaza, Seri Mastura
Published: (2012)
Analysis and decentralised optimal flow control of heterogeneous computer communication network models
by: Ku-Mahamud, Ku Ruhana
Published: (1993)
by: Ku-Mahamud, Ku Ruhana
Published: (1993)
An enhancement of toe model by investigating the influential factors of cloud adoption security objectives
by: Bhuiyan, Md. Yeahia
Published: (2018)
by: Bhuiyan, Md. Yeahia
Published: (2018)
Self-Verification Of Public-Key
Agreement Over Voip Using Random
Fusion Scheme
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
Information quality structure framework in developing an information security management system (ISMS)
by: Palaniappan, P Siva Shamala
Published: (2017)
by: Palaniappan, P Siva Shamala
Published: (2017)
Shop floor inspection, control and monitoring system in discrete manufacturing
by: Palanisamy, Siva
Published: (2007)
by: Palanisamy, Siva
Published: (2007)
Partial Verification Bias Correction In Diagnostic Accuracy Studies Using Propensity Score-Based Methods
by: Wan Mansor, Wan Nor Arifin
Published: (2023)
by: Wan Mansor, Wan Nor Arifin
Published: (2023)
Similar Items
-
Open source forensic tools for linux hard disk investigation
by: Amin Maree, Bashar (Moh'd Walid)
Published: (2010) -
Modeling activity diagram to colored petri net for validation and verification based on non functional parameters
by: Balagatabi, Hossein Nematzadeh
Published: (2008) -
Modelling UML activity diagram to colored petri net for validation and verification based on non functional parameters
by: Balagatabi, Hossein Nematzadeh
Published: (2008) -
Simplified database forensic investigation using metamodeling approach
by: Al-Dhaqm, Arafat Mohammed Rashad
Published: (2019) -
Online signature verification using probabilistic modeling and neural network
by: Mohamed Ahsan , Amin
Published: (2010)