-
1
-
-
77955574175
-
Digital Evidence in Cloud Computing Systems,
-
M. Taylor, J. Haggerty, D. Gresty, R. Hegarty, "Digital Evidence in Cloud Computing Systems," Computer Law & Security, pp. 304-308, 2010.
-
(2010)
Computer Law & Security
, pp. 304-308
-
-
Taylor, M.1
Haggerty, J.2
Gresty, D.3
Hegarty, R.4
-
2
-
-
84863088193
-
Cloud Computing - Concepts, Architecture and Challenges,
-
Y. Jadeja, K. Modi, "Cloud Computing - Concepts, Architecture and Challenges," International Conference on Computing, Electronics and Electrical Technologies [ICCEET], pp. 877-880, 2012.
-
(2012)
International Conference on Computing, Electronics and Electrical Technologies [ICCEET]
, pp. 877-880
-
-
Jadeja, Y.1
Modi, K.2
-
3
-
-
78649268599
-
A Cloud Trust Model in a Security Aware Cloud,
-
H. Sato, A. Kanai, S. Tanimoto, "A Cloud Trust Model in a Security Aware Cloud," Annual International Symposium on Applications and the Internet, pp. 121-124, 2010.
-
(2010)
Annual International Symposium on Applications and the Internet
, pp. 121-124
-
-
Sato, H.1
Kanai, A.2
Tanimoto, S.3
-
4
-
-
79959557055
-
Addressing Cloud Computing Security Issues,
-
D. Zissis, D, Lekkas, "Addressing Cloud Computing Security Issues," Future Generation Computer Systems, pp. 583-592, 2012.
-
(2012)
Future Generation Computer Systems
, pp. 583-592
-
-
Zissis, D.1
Lekkas, D.2
-
5
-
-
67649425263
-
"Cloud computing - A question of trust,"
-
June
-
C. Everett. "Cloud computing - A question of trust," Computer Fraud & Security, pp. 5-7, June 2009.
-
(2009)
Computer Fraud & Security
, pp. 5-7
-
-
Everett, C.1
-
8
-
-
84857227025
-
Regeneration of events using system snapshots for cloud forensic analysis,
-
A. Belorkar, G. Geethakumari, "Regeneration of events using system snapshots for cloud forensic analysis," India Conference (INDICON), pp. 1-4, 2011.
-
(2011)
India Conference (INDICON)
, pp. 1-4
-
-
Belorkar, A.1
Geethakumari, G.2
-
10
-
-
84870243026
-
An integrated conceptual digital forensic framework for cloud computing,
-
B. Martini, K. R. Choo, "An integrated conceptual digital forensic framework for cloud computing," Digital Investigation, pp. 1-10, 2012.
-
(2012)
Digital Investigation
, pp. 1-10
-
-
Martini, B.1
Choo, K.R.2
-
11
-
-
84865649004
-
-
D. Reilly, C Wren, T. Berry, "Cloud Computing: Forensic Challenges for Law Enforcement," pp. 1-7, 2010.
-
(2010)
"Cloud Computing: Forensic Challenges for Law Enforcement,"
, pp. 1-7
-
-
Reilly, D.1
Wren, C.2
Berry, T.3
-
12
-
-
80155212257
-
Cloud computing: new challenges and opportunities,
-
R. Morrell and A. Chandrashekar, "Cloud computing: new challenges and opportunities," Network Security, pp. 18-19, 2011.
-
(2011)
Network Security
, pp. 18-19
-
-
Morrell, R.1
Chandrashekar, A.2
-
13
-
-
84866690602
-
Forensics Investigation Challenges in Cloud Computing Environments,
-
M. Damshenas, A. Dehghantanha, R. Mahmoud, S. Shamsuddin, "Forensics Investigation Challenges in Cloud Computing Environments," Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), pp. 190-194, 2012.
-
(2012)
Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)
, pp. 190-194
-
-
Damshenas, M.1
Dehghantanha, A.2
Mahmoud, R.3
Shamsuddin, S.4
-
19
-
-
84880771653
-
-
Fifth Annual Workshop on the Economics and Information Security
-
T. Moore, "The economics of digital forensics," Fifth Annual Workshop on the Economics and Information Security, 2006.
-
(2006)
"The economics of digital forensics,"
-
-
Moore, T.1
-
22
-
-
84855646451
-
Privacy Preserving Multiple Keyword Search for Confidential Investigation of Remote Forensics,
-
S. Hou, T. Uehara, S.M. Yiu, L. C. K. Hui, K. P. Chow, "Privacy Preserving Multiple Keyword Search for Confidential Investigation of Remote Forensics," International Conference on Multimedia Information Networking and Security, pp. 595-599, 2011.
-
(2011)
International Conference on Multimedia Information Networking and Security
, pp. 595-599
-
-
Hou, S.1
Uehara, T.2
Yiu, S.M.3
Hui, L.C.K.4
Chow, K.P.5
-
23
-
-
84880773643
-
-
Y. Zhu, H. Hu, G. Ahn, and M. Yu, "Cooperative provable data possession for integrity verification in multi-cloud storage," 2012.
-
(2012)
"Cooperative provable data possession for integrity verification in multi-cloud storage,"
-
-
Zhu, Y.1
Hu, H.2
Ahn, G.3
Yu, M.4
-
25
-
-
79951796752
-
A Cloud Architecture of Virtual Trusted Platform Modules,
-
D. Liu, J. Lee, J. Jang, S. Nepal, J. Zic, "A Cloud Architecture of Virtual Trusted Platform Modules," IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp. 804-811, 2010.
-
(2010)
IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
, pp. 804-811
-
-
Liu, D.1
Lee, J.2
Jang, J.3
Nepal, S.4
Zic, J.5
-
26
-
-
84866690602
-
Forensics investigation challenges in cloud computing environments,
-
M. Damshenas, A. Dehghantanha, R. Mahmoud, S. Bin Shamsuddin, "Forensics investigation challenges in cloud computing environments," Cyber Warfare and Digital Forensics (CyberSec), pp. 190-194, 2012.
-
(2012)
Cyber Warfare and Digital Forensics (CyberSec)
, pp. 190-194
-
-
Damshenas, M.1
Dehghantanha, A.2
Mahmoud, R.3
Shamsuddin, S.B.4
-
27
-
-
80053128626
-
Analysis of virtual honeynet and VLAN-based virtual networks,
-
F. Daryabar, A. Dehghantanha, F. Norouzi, F Mahmoodi, "Analysis of virtual honeynet and VLAN-based virtual networks," Science & Engineering Research (SHUSER), pp. 73-70, 2011.
-
(2011)
Science & Engineering Research (SHUSER)
, pp. 73-70
-
-
Daryabar, F.1
Dehghantanha, A.2
Norouzi, F.3
Mahmoodi, F.4
-
29
-
-
84880794551
-
"Towards Green Frameworks for Digital Forensics Investigation,"
-
A. Dehghantanha, R. Mahmoud, N. I Udzir, "Towards Green Frameworks for Digital Forensics Investigation," Journal of Convergence Information Technology (JCIT), Vol. 8, No. 2, pp. 669 ~ 678, 2013.
-
(2013)
Journal of Convergence Information Technology (JCIT)
, vol.8
, Issue.2
, pp. 669-678
-
-
Dehghantanha, A.1
Mahmoud, R.2
Udzir, N.I.3
-
30
-
-
79957596352
-
"Utilizing Trusted Platform Module to Mitigate Botnet Attacks"
-
M. Sidheeq, A. Dehghantanha,G. Kananparan, "Utilizing Trusted Platform Module to Mitigate Botnet Attacks", International Journal of Advancements in Computing Technology(IJACT), Vol. 2, No. 5, pp. 111 ~ 117, 2010.
-
(2010)
International Journal of Advancements in Computing Technology(IJACT)
, vol.2
, Issue.5
, pp. 111-117
-
-
Sidheeq, M.1
Dehghantanha, A.2
Kananparan, G.3
-
33
-
-
84880795900
-
User-centered Privacy and Trust Model in Cloud Computing Systems,
-
A. Dehghantanha, R. Mahmod, N. I Udzir, Z.A. Zulkarnain, "User-centered Privacy and Trust Model in Cloud Computing Systems," Computer And Network Technology, pp. 326-332, 2009.
-
(2009)
Computer And Network Technology
, pp. 326-332
-
-
Dehghantanha, A.1
Mahmod, R.2
Udzir, N.I.3
Zulkarnain, Z.A.4
-
35
-
-
77952378599
-
A User-Centered Context-sensitive Privacy Model in Pervasive Systems,
-
C. Sagaran, A. Dehghantanha, R Ramli, "A User-Centered Context-sensitive Privacy Model in Pervasive Systems," Communication Software and Networks, pp. 78-82, 2010.
-
(2010)
Communication Software and Networks
, pp. 78-82
-
-
Sagaran, C.1
Dehghantanha, A.2
Ramli, R.3
-
36
-
-
79958236867
-
Evaluating user-centered privacy model (UPM) in pervasive computing systems,
-
A. Dehghantanha, N. Udzir, R. Mahmod, "Evaluating user-centered privacy model (UPM) in pervasive computing systems," Computational Intelligence in Security for Information Systems, pp. 272-284, 2011.
-
(2011)
Computational Intelligence in Security for Information Systems
, pp. 272-284
-
-
Dehghantanha, A.1
Udzir, N.2
Mahmod, R.3
-
37
-
-
70449450528
-
UPM: User-Centered Privacy Model in Pervasive Computing Systems,
-
A. Dehghantanha, R. Mahmod, "UPM: User-Centered Privacy Model in Pervasive Computing Systems," Future Computer and Communication, pp. 65-70, 2009.
-
(2009)
Future Computer and Communication
, pp. 65-70
-
-
Dehghantanha, A.1
Mahmod, R.2
-
38
-
-
79961229713
-
Framework of digital forensics for the Samsung Star Series phone,
-
S. Parvez, A. Dehghantanha, HG. Broujerdi, "Framework of digital forensics for the Samsung Star Series phone," Electronics Computer Technology (ICECT), Volume 2, pp. 264-267, 2011.
-
(2011)
Electronics Computer Technology (ICECT)
, vol.2
, pp. 264-267
-
-
Parvez, S.1
Dehghantanha, A.2
Broujerdi, H.G.3
-
39
-
-
85013147378
-
Smartphone Forensics: A Case Study with Nokia E5-00 Mobile Phone,
-
S. H. Mohtasebi, A. Dehghantanha, H. G. Broujerdi, "Smartphone Forensics: A Case Study with Nokia E5-00 Mobile Phone," International Journal of Digital Information and Wireless Communications (IJDIWC),volume 1, issue 3, pp. 651-655, 2012.
-
(2012)
International Journal of Digital Information and Wireless Communications (IJDIWC),volume 1, issue 3
, pp. 651-655
-
-
Mohtasebi, S.H.1
Dehghantanha, A.2
Broujerdi, H.G.3
-
40
-
-
84866663369
-
"Volatile memory acquisition using backup for forensic investigation,"
-
F. N. Dezfouli, A. Dehghantanha, R. Mahmoud ,"Volatile memory acquisition using backup for forensic investigation," Cyber Warfare and Digital Foresnsic, pp. 186-189, 2012.
-
(2012)
Cyber Warfare and Digital Foresnsic
, pp. 186-189
-
-
Dezfouli, F.N.1
Dehghantanha, A.2
Mahmoud, R.3
-
41
-
-
84866657297
-
VoIP evidence model: A new forensic method for investigating VoIP malicious attacks,
-
M. Ibrahim, MT. Abdullah, A. Dehghantanha , "VoIP evidence model: A new forensic method for investigating VoIP malicious attacks," Cyber Security, Cyber Warfare and Digital Forensic , pp. 201-206, 2012.
-
(2012)
Cyber Security, Cyber Warfare and Digital Forensic
, pp. 201-206
-
-
Ibrahim, M.1
Abdullah, M.T.2
Dehghantanha, A.3
-
42
-
-
85013143699
-
Investigation of Malware Defence and Detection Techniques,
-
F. Daryabar, A. Dehghantanha, HG. Broujerdi, "Investigation of Malware Defence and Detection Techniques," International Journal of Digital Information and Wireless Communications (IJDIWC), volume 1, issue 3, pp. 645-650, 2012.
-
(2012)
International Journal of Digital Information and Wireless Communications (IJDIWC)
, vol.1
, Issue.3
, pp. 645-650
-
-
Daryabar, F.1
Dehghantanha, A.2
Broujerdi, H.G.3
-
43
-
-
84856645731
-
Investigation of bypassing malware defences and malware detections,
-
F. Daryabar, A. Dehghantanha, NI. Udzir, "Investigation of bypassing malware defences and malware detections," Conference on Information Assurance and Security (IAS), pp. 173-178, 2011.
-
(2011)
Conference on Information Assurance and Security (IAS)
, pp. 173-178
-
-
Daryabar, F.1
Dehghantanha, A.2
Udzir, N.I.3
-
44
-
-
84880830739
-
A Framework of TPM, SVM and Boot Control for Securing Forensic Logs,
-
N. Borhan, R. Mahmod, A. Dehghantanha, "A Framework of TPM, SVM and Boot Control for Securing Forensic Logs," International Journal of Computer Application, pp. 65-70, 2009.
-
(2009)
International Journal of Computer Application
, pp. 65-70
-
-
Borhan, N.1
Mahmod, R.2
Dehghantanha, A.3
-
45
-
-
77954809156
-
Towards a pervasive formal privacy language,
-
A. Dehghantanha, N. I Udzir, R. Mahmod, "Towards a pervasive formal privacy language," Advanced Information Networking and Applications Workshops (WAINA), pp. 1085-1091, 2010.
-
(2010)
Advanced Information Networking and Applications Workshops (WAINA)
, pp. 1085-1091
-
-
Dehghantanha, A.1
Udzir, N.I.2
Mahmod, R.3
-
46
-
-
79958192041
-
A XML based, User-centered Privacy Model in Pervasive Computing Systems,
-
A. Dehghantanha, R. Mahmod, N. I Udzir, "A XML based, User-centered Privacy Model in Pervasive Computing Systems," International Journal of Computer Science and Networking Security, Vol.9, Issue 2, pp. 167-173, 2009.
-
(2009)
International Journal of Computer Science and Networking Security, Vol.9, Issue 2
, pp. 167-173
-
-
Dehghantanha, A.1
Mahmod, R.2
Udzir, N.I.3
-
47
-
-
84880795900
-
User-centered Privacy and Trust Model in Cloud Computing Systems
-
A. Dehghantanha, R. Mahmod, N. I Udzir, Z.A. Zulkarnain, "User-centered Privacy and Trust Model in Cloud Computing Systems," Computer And Network Technology, pp. 326-332, 2009.
-
(2009)
Computer And Network Technology
, pp. 326-332
-
-
Dehghantanha, A.1
Mahmod, R.2
Udzir, N.I.3
Zulkarnain, Z.A.4
|