Search Results - "Mohamad, Kamaruddin Malik"
-
1
A Meta-Heuristic Method for Reassemble Bifragmented Intertwined JPEG Image Files in Digital Forensic Investigation
Published in IEEE access (2023)“…Traditional image recovery from corrupted file systems plays a significant role in Digital Forensics investigation. The images are mainly considered objective…”
Get full text
Journal Article -
2
RX_myKarve carving framework for reassembling complex fragmentations of JPEG images
Published in Journal of King Saud University. Computer and information sciences (01-01-2021)“…Digital forensic aims to provide an assistance for making decisions about a crime by looking at a file content which usually involves image files such as GIF,…”
Get full text
Journal Article -
3
A Review of Iris Recognition Algorithms
Published in JOIV : international journal on informatics visualization Online (30-11-2017)“…With the prominent needs for security and reliable mode of identification in biometric system. Iris recognition has become reliable method for personal…”
Get full text
Journal Article -
4
A policy driven, human oriented information security model: a case study in UAE banking sector
Published in 2019 IEEE Conference on Application, Information and Network Security (AINS) (01-11-2019)“…As companies continue to invest in information security, human weaknesses continue to remain a root cause of data breaches in organisations. Several security…”
Get full text
Conference Proceeding -
5
Feature Selection to Enhance DDoS Detection Using Hybrid N-Gram Heuristic Techniques
Published in JOIV : international journal on informatics visualization Online (10-09-2023)“…Various forms of distributed denial of service (DDoS) assault systems and servers, including traffic overload, request overload, and website breakdowns…”
Get full text
Journal Article -
6
Critical Information Infrastructure Protection Framework Development: Preliminary Findings from the Malaysian Public Sector
Published in 2020 8th International Conference on Information Technology and Multimedia (ICIMU) (24-08-2020)“…This paper reports preliminary findings on the Malaysian Public Sector Critical Information Infrastructure Protection (MPS CIIP) Framework development…”
Get full text
Conference Proceeding -
7
A Systematic Redundancy Approach in Watermarking Using Sudoku
Published in 2014 International Conference on IT Convergence and Security (ICITCS) (01-10-2014)“…Digital watermarking is one of the most important techniques employed to protect digital contents. Copyright information embedded in the digital contents may…”
Get full text
Conference Proceeding -
8
Single-byte-marker for Detecting JPEG JFIF Header Using FORIMAGE-JPEG
Published in 2009 Fifth International Joint Conference on INC, IMS and IDC (01-08-2009)“…Header and footer detection is important in digital investigation for file type detection. The use of efficient algorithm to detect them is vital to reduce…”
Get full text
Conference Proceeding -
9
Carving JPEG images and thumbnails using image pattern matching
Published in 2011 IEEE Symposium on Computers & Informatics (01-03-2011)“…Digital forensics is a branch of forensic science to monitor, analyze and examine digital media or devices. File carving is the art of recovering files from…”
Get full text
Conference Proceeding