Search Results - "Mohamad, Kamaruddin Malik"

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    A Meta-Heuristic Method for Reassemble Bifragmented Intertwined JPEG Image Files in Digital Forensic Investigation by Ali, Rabei Raad, Mohamad, Kamaruddin Malik Bin, Mostafa, Salama A., Zebari, Dilovan Asaad, Jubair, Mohammed Ahmed, Alouane, M. Turki-Hadj

    Published in IEEE access (2023)
    “…Traditional image recovery from corrupted file systems plays a significant role in Digital Forensics investigation. The images are mainly considered objective…”
    Get full text
    Journal Article
  2. 2

    RX_myKarve carving framework for reassembling complex fragmentations of JPEG images by Ali, Rabei Raad, Mohamad, Kamaruddin Malik

    “…Digital forensic aims to provide an assistance for making decisions about a crime by looking at a file content which usually involves image files such as GIF,…”
    Get full text
    Journal Article
  3. 3

    A Review of Iris Recognition Algorithms by Ghali, Abdulrahman Aminu, Jamel, Sapiee, Mohamad, Kamaruddin Malik, Yakub, Nasir Abubakar, Mat Deris, Mustafa

    “…With the prominent needs for security and reliable mode of identification in biometric system. Iris recognition has become reliable method for personal…”
    Get full text
    Journal Article
  4. 4

    A policy driven, human oriented information security model: a case study in UAE banking sector by Alhosani, Khalid Eisa Haidar Abdalla, Khalid, Shamsul Kamal Ahmad, Samsudin, Noor Azah, Jamel, Sapiee, Mohamad, Kamaruddin Malik bin

    “…As companies continue to invest in information security, human weaknesses continue to remain a root cause of data breaches in organisations. Several security…”
    Get full text
    Conference Proceeding
  5. 5

    Feature Selection to Enhance DDoS Detection Using Hybrid N-Gram Heuristic Techniques by Maslan, Andi, Mohamad, Kamaruddin Malik Bin, Hamid, Abdul, Pangaribuan, Hotma, Sitohang, Sunarsan

    “…Various forms of distributed denial of service (DDoS) assault systems and servers, including traffic overload, request overload, and website breakdowns…”
    Get full text
    Journal Article
  6. 6

    Critical Information Infrastructure Protection Framework Development: Preliminary Findings from the Malaysian Public Sector by Sabtu, Saiful Bahari Mohd, Mohamad, Kamaruddin Malik

    “…This paper reports preliminary findings on the Malaysian Public Sector Critical Information Infrastructure Protection (MPS CIIP) Framework development…”
    Get full text
    Conference Proceeding
  7. 7

    A Systematic Redundancy Approach in Watermarking Using Sudoku by Ahmad Khalid, Shamsul Kamal, Deris, Mustafa Mat, Mohamad, Kamaruddin Malik

    “…Digital watermarking is one of the most important techniques employed to protect digital contents. Copyright information embedded in the digital contents may…”
    Get full text
    Conference Proceeding
  8. 8

    Single-byte-marker for Detecting JPEG JFIF Header Using FORIMAGE-JPEG by Mohamad, K.M., Deris, M.M.

    “…Header and footer detection is important in digital investigation for file type detection. The use of efficient algorithm to detect them is vital to reduce…”
    Get full text
    Conference Proceeding
  9. 9

    Carving JPEG images and thumbnails using image pattern matching by Mohamad, K. M., Patel, A., Deris, M. M.

    “…Digital forensics is a branch of forensic science to monitor, analyze and examine digital media or devices. File carving is the art of recovering files from…”
    Get full text
    Conference Proceeding