-
2
-
-
78049459598
-
-
Islamic Book Trust, Kuala Lumpur, ISBN: 983-9154-02-8
-
Ali, M., 1996. Hadith and Sunnah. Islamic Book Trust, Kuala Lumpur, ISBN: 983-9154-02-8, pp: 23.
-
(1996)
Hadith and Sunnah
, pp. 23
-
-
Ali, M.1
-
3
-
-
78049486510
-
-
Anderson, A., M. Corney, O. De Veland and G. Mohay, 2001. Identifying the Authors of Suspect Email, Computers and Security. http://eprints.qut.edu.au/8021/1/CompSecurityPaper.pdf
-
(2001)
Identifying the Authors of Suspect Email, Computers and Security
-
-
Anderson, A.1
Corney, M.2
De Veland, O.3
Mohay, G.4
-
4
-
-
3042642695
-
Getting physical with the digital investigative process
-
Carrier, B. and E.H. Spafford, 2002. Getting physical with the digital investigative process. Int. J. Digit. Evid., Fall, 1: 1-20.
-
(2002)
Int. J. Digit. Evid., Fall
, vol.1
, pp. 1-20
-
-
Carrier, B.1
Spafford, E.H.2
-
5
-
-
78049465505
-
The enhanced digital investigation process model
-
Baryamureeba, V. and F. Tushabee, 2006. The enhanced digital investigation process model. Asian J. Inform. Technol., 5: 790-794.
-
(2006)
Asian J. Inform. Technol.
, vol.5
, pp. 790-794
-
-
Baryamureeba, V.1
Tushabee, F.2
-
6
-
-
34047230751
-
Who's at the keyboard authorship attribution in digital evidence investigations
-
Chaski, C.E., 2005. Who's at the keyboard authorship attribution in digital evidence investigations. Int. J. Digit. Evid., 4: 1-13.
-
(2005)
Int. J. Digit. Evid.
, vol.4
, pp. 1-13
-
-
Chaski, C.E.1
-
7
-
-
0042367634
-
Mining e-mail content for author identification forensics
-
De Vel, O., A. Anderson, M. Corney and G. Mohay, 2001. Mining e-mail content for author identification forensics. ACM SIGMOD Rec., 30: 55-64.
-
(2001)
ACM SIGMOD Rec
, vol.30
, pp. 55-64
-
-
De Vel, O.1
Anderson, A.2
Corney, M.3
Mohay, G.4
-
8
-
-
33947387917
-
Trust management in distributed systems
-
DOI: 10.1109/MC.2007.76
-
Li, H. and M. Singhal, 2007. Trust management in distributed systems. Computer, 40: 45-53. DOI: 10.1109/MC.2007.76
-
(2007)
Computer
, vol.40
, pp. 45-53
-
-
Li, H.1
Singhal, M.2
-
9
-
-
78049464120
-
-
Adam Publishers and Distribution, New Delhi, ISBN: 81-7435-474-3
-
Mahmood, K., 2006. Hadith and Its Literary Style. Adam Publishers and Distribution, New Delhi, ISBN: 81-7435-474-3, pp: 11-28.
-
(2006)
Hadith and Its Literary Style
, pp. 11-28
-
-
Mahmood, K.1
-
12
-
-
50849087527
-
Computer forensics field triage process model
-
Rogers, M.K., J. Goldman, R. Mislan, T. Wedge and S. Debrota, 2006. Computer forensics field triage process model. Proceeding of the Conference on Digital Forensics Security and Law, pp: 27-40.
-
(2006)
Proceeding of the Conference on Digital Forensics Security and Law
, pp. 27-40
-
-
Rogers, M.K.1
Goldman, J.2
Mislan, R.3
Wedge, T.4
Debrota, S.5
-
14
-
-
78049466819
-
Conceptual similarities between hadith authentication and digital evidence verification techniques
-
UNITEN, Malaysia
-
Yusoff, Y., R. Ismail, M.Z. Mohd Yusof and A.A. Mat Isa, 2008. Conceptual similarities between hadith authentication and digital evidence verification techniques. Proceedings of the 4th International Conference Information Technology and Multimedia, UNITEN, Malaysia, pp: 192-196.
-
(2008)
Proceedings of the 4th International Conference Information Technology and Multimedia
, pp. 192-196
-
-
Yusoff, Y.1
Ismail, R.2
Mohd Yusof, M.Z.3
Mat Isa, A.A.4
|