Determining forensic tools efficiency based on secured firewalls and ids characteristic
Also available in printed version: HV8079.C65 N87 2014 raf
| Main Author: | Nurul Ain Basri |
|---|---|
| Other Authors: | Zuraini Ismail, supervisor |
| Format: | Master's thesis |
| Language: | English |
| Published: |
Universiti Teknologi Malaysia
2025
|
| Subjects: | |
| Online Access: | https://utmik.utm.my/handle/123456789/53764 |
| Abstract | Abstract here |
Similar Items
A guideline for digital forensics investigation on smartphones with the incorporation of traceability
by: Vickneshwaran, J
Published: (2025)
by: Vickneshwaran, J
Published: (2025)
Database forensic analysis framework for SQL injection attack in MYSQL
by: Muhammad Razif Ab. Rahman
Published: (2025)
by: Muhammad Razif Ab. Rahman
Published: (2025)
Study of secure firewall filtering mechanism for network security
by: Mohammed Mustafa Mohammed
Published: (2025)
by: Mohammed Mustafa Mohammed
Published: (2025)
Collecting more volatile information in live investigation of Botnet attack
by: Yashar Javadianasl
Published: (2025)
by: Yashar Javadianasl
Published: (2025)
Enhanced computer forensic approach for cloud computing environment
by: Mubarak Ahmed Abdulwali Ahmed
Published: (2025)
by: Mubarak Ahmed Abdulwali Ahmed
Published: (2025)
Secured messaging system
by: Abd. Rahim Mat Sidek
Published: (2025)
by: Abd. Rahim Mat Sidek
Published: (2025)
Non technical approach to multi layered network security against malware
by: Christine Simfukwe
Published: (2025)
by: Christine Simfukwe
Published: (2025)
A cloud security audit quality model for a commercial bank in Malaysia
by: Mariana Md. Hashim
Published: (2025)
by: Mariana Md. Hashim
Published: (2025)
A cloud security audit quality model for a commercial bank in Malaysia
by: Mariana Md. Hashim
Published: (2025)
by: Mariana Md. Hashim
Published: (2025)
An embedded system for networking security applying cryptographic acceleration in field programmable gate array hardware
by: Vishnu Paramasivam
Published: (2025)
by: Vishnu Paramasivam
Published: (2025)
Analysis issues of computer network security management for disposable dishes companies in Iran
by: Fatemeh Honarjoo
Published: (2025)
by: Fatemeh Honarjoo
Published: (2025)
Security in voice over internet protocol (VOIP) : implementation and analysis
by: Maimun Rizal
Published: (2025)
by: Maimun Rizal
Published: (2025)
Antecedents to the adoption of corporate computer forensics investigation in Malaysia critical information infrastructure agencies / Wan Abdul Malek Wan Abdullah
by: Wan Abdullah, Wan Abdul Malek
Published: (2018)
by: Wan Abdullah, Wan Abdul Malek
Published: (2018)
Secure wireless implementation based on IEEE 802.1x network standard
by: al-Slakhi, Mahmoud H.R
Published: (2025)
by: al-Slakhi, Mahmoud H.R
Published: (2025)
Identification IPV6 security features and securty comparsion between IPV4 and IPV6
by: Omar Ahmed Abdelsalam
Published: (2025)
by: Omar Ahmed Abdelsalam
Published: (2025)
Development of network policy based server (authentication firewall server)
by: Mohd. Nizam Hassan
Published: (2025)
by: Mohd. Nizam Hassan
Published: (2025)
Firewall for mitigation relay attack in near field communication in smartphones
by: Mehdi Hossein Zadeh
Published: (2025)
by: Mehdi Hossein Zadeh
Published: (2025)
A security awareness model for the establishment of a human firewall in taxation agency
by: Haslina Sahar
Published: (2025)
by: Haslina Sahar
Published: (2025)
A model of security awareness in cloud computing
by: Abdul Ghafar Jaafar
Published: (2025)
by: Abdul Ghafar Jaafar
Published: (2025)
Analysis of user awareness on phishing attempt among student
by: Vanisri Nagalingam
Published: (2025)
by: Vanisri Nagalingam
Published: (2025)
Bimodal recognition based on thumbprint and thumb image using bayesian classfier
by: Low, Zhi Wei
Published: (2025)
by: Low, Zhi Wei
Published: (2025)
Hybrid fuzzy techniques for unsupervised intrusion detection system
by: Witcha Chimphlee
Published: (2025)
by: Witcha Chimphlee
Published: (2025)
Airline special service request (SSR) passengers tracking system using RFID
by: Foo, Yong Jing
Published: (2025)
by: Foo, Yong Jing
Published: (2025)
Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan (Full text)
Published: (2025)
Published: (2025)
Support vector machine for solving small dataset problem
by: Ahmad Rijal Abdul Rahman
Published: (2025)
by: Ahmad Rijal Abdul Rahman
Published: (2025)
Sistem penilaian tahap keselamatan rangkaian berpandukan network rating model
by: Ab. Aziz Ikhwan Ab. Wahab
Published: (2025)
by: Ab. Aziz Ikhwan Ab. Wahab
Published: (2025)
A FAPA based model for protection flooding attack in a cloud system
by: Raihan Palash
Published: (2025)
by: Raihan Palash
Published: (2025)
Analysys on security issue of service dilevery model software as a service (SAAS) in public cloud comptuing
by: Muhammad Fisal Zakaria
Published: (2025)
by: Muhammad Fisal Zakaria
Published: (2025)
Security implementation approach for the use of bring your own device in government agencies
by: Mohamad Roshidi Rozali
Published: (2025)
by: Mohamad Roshidi Rozali
Published: (2025)
Physical security measures framework for Marib power plant (Yemen)
by: Anas Mustafa Mohammed Al-Aghbari
Published: (2025)
by: Anas Mustafa Mohammed Al-Aghbari
Published: (2025)
The development of stage 1 & step 1 until step 2 of stage 2 of the malaysian public sector information security risk assessment methodology (MyRAM) tool for scan associates bhd
by: Che Zalila Che Jaafar
Published: (2025)
by: Che Zalila Che Jaafar
Published: (2025)
Efficient routing protocol and topology in bluetooth network using NS-2 / Faezah Abdul Muttalib
by: Abdul Muttalib, Faezah
Published: (2015)
by: Abdul Muttalib, Faezah
Published: (2015)
Security model for microsoft based mobile sales management application in private cloud computing
by: Kuan, Chee Houng
Published: (2025)
by: Kuan, Chee Houng
Published: (2025)
Detection of vegetable oil residues from fire debris samples
by: Teah, Yu Nuo
Published: (2025)
by: Teah, Yu Nuo
Published: (2025)
Standard operating procedure for digital evidence in cyber crime
by: Mohd. Kamarudin Md. Din
Published: (2025)
by: Mohd. Kamarudin Md. Din
Published: (2025)
Lecturer’s awareness on information security threats in e-learning system: ABC University
by: Moganavatsala Jeevanantham
Published: (2025)
by: Moganavatsala Jeevanantham
Published: (2025)
Secure Model for Online Shopping Among Millennial in Yemen
by: Shehab Mohammed Ali Albadri
Published: (2025)
by: Shehab Mohammed Ali Albadri
Published: (2025)
Improving a multi-factor authentication using multiple graphical password and PDA
by: Jalal Mawlud H.Bradi
Published: (2025)
by: Jalal Mawlud H.Bradi
Published: (2025)
Konfigurasi dan pembangunan perkhidmatan FWTK serta analisa keberkesanannya (Full text)
Published: (2025)
Published: (2025)
Comparison of pattern matching algorithm for enhancing snort performance
by: Abubakar Abdulkadir
Published: (2025)
by: Abubakar Abdulkadir
Published: (2025)
Similar Items
-
A guideline for digital forensics investigation on smartphones with the incorporation of traceability
by: Vickneshwaran, J
Published: (2025) -
Database forensic analysis framework for SQL injection attack in MYSQL
by: Muhammad Razif Ab. Rahman
Published: (2025) -
Study of secure firewall filtering mechanism for network security
by: Mohammed Mustafa Mohammed
Published: (2025) -
Collecting more volatile information in live investigation of Botnet attack
by: Yashar Javadianasl
Published: (2025) -
Enhanced computer forensic approach for cloud computing environment
by: Mubarak Ahmed Abdulwali Ahmed
Published: (2025)