A model for validation and verification of disk imaging in computer forensic investigation
In digital forensic investigation practices, there are numerous digital forensics preservation tools that have been used by practitioners all over the world. Tool development continues as the practitioner’s demands increases. It is important to have right specialized tools in order to ensure that al...
| Auteur principal: | Palaniappan, P. Siva Shamala |
|---|---|
| Format: | Thèse |
| Langue: | anglais |
| Publié: |
2009
|
| Sujets: | |
| Accès en ligne: | http://eprints.utm.my/11504/1/PSivaShamalaMFSKSM2009.pdf |
Documents similaires
Open source forensic tools for linux hard disk investigation
par: Amin Maree, Bashar (Moh'd Walid)
Publié: (2010)
par: Amin Maree, Bashar (Moh'd Walid)
Publié: (2010)
Modeling activity diagram to colored petri net for validation and verification based on non functional parameters
par: Balagatabi, Hossein Nematzadeh
Publié: (2008)
par: Balagatabi, Hossein Nematzadeh
Publié: (2008)
Modelling UML activity diagram to colored petri net for validation and verification based on non functional parameters
par: Balagatabi, Hossein Nematzadeh
Publié: (2008)
par: Balagatabi, Hossein Nematzadeh
Publié: (2008)
Simplified database forensic investigation using metamodeling approach
par: Al-Dhaqm, Arafat Mohammed Rashad
Publié: (2019)
par: Al-Dhaqm, Arafat Mohammed Rashad
Publié: (2019)
Online signature verification using probabilistic modeling and neural network
par: Mohamed Ahsan , Amin
Publié: (2010)
par: Mohamed Ahsan , Amin
Publié: (2010)
Forensic investigation of link fabrication attack in software defined networks / Suleman Khan
par: Suleman , Khan
Publié: (2017)
par: Suleman , Khan
Publié: (2017)
OffSig-sinGAN: A deep learning-based image augmentation model for offline signature verification / Muhammad Muzaffar Hameed
par: Muhammad Muzaffar , Hameed
Publié: (2023)
par: Muhammad Muzaffar , Hameed
Publié: (2023)
Forensic analysis on mobile phone
par: Lee, Chuw Fan
Publié: (2008)
par: Lee, Chuw Fan
Publié: (2008)
Digital forensics adoption model for Malaysian Law Enforcement Agencies (MLEAs)
par: Mat Kamal, Siti Nuur-Ila
Publié: (2019)
par: Mat Kamal, Siti Nuur-Ila
Publié: (2019)
Stroke-to-stroke matching in on-line signature verification
par: Ahmad Jaini, Azhar
Publié: (2010)
par: Ahmad Jaini, Azhar
Publié: (2010)
Fusion features ensembling models using Siamese convolutional neural network for kinship verification
par: Mohammed Ali, Al Muashi
Publié: (2021)
par: Mohammed Ali, Al Muashi
Publié: (2021)
Online signature verification based on dynamic feature discriminators
par: Omar, Nazaruddin
Publié: (2009)
par: Omar, Nazaruddin
Publié: (2009)
Two-dimensional barcodes for hardcopy document integrity verification
par: Teoh, Chin Yew
Publié: (2008)
par: Teoh, Chin Yew
Publié: (2008)
Registration verification using image of an object / Sabariah Rawi
par: Rawi, Sabariah
Publié: (2007)
par: Rawi, Sabariah
Publié: (2007)
Comprehensive analysis on hardware forensic for gambling machine
par: Magalingam, Pritheega
Publié: (2008)
par: Magalingam, Pritheega
Publié: (2008)
Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics
par: Mosa, Mohammad Rasmi Hassun
Publié: (2013)
par: Mosa, Mohammad Rasmi Hassun
Publié: (2013)
Computer Aided 3d Skull - 2d Photo Superimposition For Forensic Anthropology
par: Tan, Joi San
Publié: (2017)
par: Tan, Joi San
Publié: (2017)
Guideline for forensic analysis on windows XP and vista registry
par: Aghanvesi, Somayeh
Publié: (2008)
par: Aghanvesi, Somayeh
Publié: (2008)
A digital forensic readiness components for operational unit
par: Mohammed Saleh, Abdulalem Ali
Publié: (2013)
par: Mohammed Saleh, Abdulalem Ali
Publié: (2013)
Account verification to prevent malicious users access in web-based forums
par: Tabar, Mahdi Taheri
Publié: (2013)
par: Tabar, Mahdi Taheri
Publié: (2013)
Verification the performance of Microsoft SQL Server / Nageswary Gannapathy
par: Nageswary , Gannapathy
Publié: (2002)
par: Nageswary , Gannapathy
Publié: (2002)
Enhanced 3-Tier Storage Management Scheme For Flash Memory-Based Solid State Disk
par: Alsalibi, Ahmed I N
Publié: (2017)
par: Alsalibi, Ahmed I N
Publié: (2017)
Digital Forensic Automation Model For Online Social Networks
par: Arshad, Humaira
Publié: (2019)
par: Arshad, Humaira
Publié: (2019)
Enhanced forensic process model in cloud environment
par: Moussa, Ahmed Nour
Publié: (2018)
par: Moussa, Ahmed Nour
Publié: (2018)
The practical analysis towards developing a guideline for the Xbox 360 forensic
par: Mohd. Isa, Hairul Azni
Publié: (2009)
par: Mohd. Isa, Hairul Azni
Publié: (2009)
Digital forensic data collection in cloud computing using logic model
par: Khairul Afandy Abu Bakar
Publié: (2012)
par: Khairul Afandy Abu Bakar
Publié: (2012)
Computational optimization and investigation of conjugate heat and mass transfer in porous cavity / Azeem
par: Azeem, -
Publié: (2017)
par: Azeem, -
Publié: (2017)
Offline signature verification using ordinal structure fuzzy logic and integrated features based on single signature
par: Abdulfattah, Ghassan Marwan
Publié: (2019)
par: Abdulfattah, Ghassan Marwan
Publié: (2019)
Redesign, optimization and validation of keyseat
par: Muttaqin, Hilman
Publié: (2008)
par: Muttaqin, Hilman
Publié: (2008)
Feature engineering techniques to classify cause of death from forensic autopsy reports / Ghulam Mujtaba
par: Ghulam , Mujtaba
Publié: (2018)
par: Ghulam , Mujtaba
Publié: (2018)
Computer model on linear wave propagation
par: Ling, How Ing
Publié: (2013)
par: Ling, How Ing
Publié: (2013)
Labeling algorithm for validation of 2D line drawing
par: Mardzuki, Samihah
Publié: (2011)
par: Mardzuki, Samihah
Publié: (2011)
A unified trust model for pervasive computing environment
par: Khiabani, Hamed
Publié: (2013)
par: Khiabani, Hamed
Publié: (2013)
Adaptive learning model for learning computational thinking through educational robotic
par: Jamal, Nurul Nazihah
Publié: (2021)
par: Jamal, Nurul Nazihah
Publié: (2021)
Development of research trends evolution model for computer science for Malaysian publication
par: Md. Nadzar, Nurul Mardhiah Azura
Publié: (2022)
par: Md. Nadzar, Nurul Mardhiah Azura
Publié: (2022)
Self-Verification Of Public-Key
Agreement Over Voip Using Random
Fusion Scheme
par: Alfin Syafalni, Alfin Syafalni
Publié: (2016)
par: Alfin Syafalni, Alfin Syafalni
Publié: (2016)
Computational modeling of cerebellar model articulation controller / Alireza Jalali
par: Alireza, Jalali
Publié: (2015)
par: Alireza, Jalali
Publié: (2015)
Image binarization of historical document image
par: Mat Som, Hafizan
Publié: (2007)
par: Mat Som, Hafizan
Publié: (2007)
A modified computational model of ant colony system in DNA sequence design
par: Mustaza, Seri Mastura
Publié: (2012)
par: Mustaza, Seri Mastura
Publié: (2012)
Analysis and decentralised optimal flow control of heterogeneous computer communication network models
par: Ku-Mahamud, Ku Ruhana
Publié: (1993)
par: Ku-Mahamud, Ku Ruhana
Publié: (1993)
Documents similaires
-
Open source forensic tools for linux hard disk investigation
par: Amin Maree, Bashar (Moh'd Walid)
Publié: (2010) -
Modeling activity diagram to colored petri net for validation and verification based on non functional parameters
par: Balagatabi, Hossein Nematzadeh
Publié: (2008) -
Modelling UML activity diagram to colored petri net for validation and verification based on non functional parameters
par: Balagatabi, Hossein Nematzadeh
Publié: (2008) -
Simplified database forensic investigation using metamodeling approach
par: Al-Dhaqm, Arafat Mohammed Rashad
Publié: (2019) -
Online signature verification using probabilistic modeling and neural network
par: Mohamed Ahsan , Amin
Publié: (2010)