Digital forensic investigation of trojan attacks in network using wireshark, FTK imager and volatility / Muhamad Arif Hashim ... [et al.]
Trojan attacks are the most common and serious threat to network users. It is a program that appears to be useful program but actually harmful one. It is difficult to detect Trojan attacks because it uses special techniques to conceal its activities from antiviruses and users. Thus, this research in...
Saved in:
Main Authors: | Hashim, Muhamad Arif (Author), Abd Halim, Iman Hazwam (Author), Ismail, Mohammad Hafiz (Author), Mohd Noor, Norfaizalfarid (Author), Mohd Fuzi, Mohd Faris (Author), Mohammed, Abdul Hapes (Author), JM. Gining, Ray Adderley (Author) |
---|---|
Format: | Book |
Published: |
UiTM Cawangan Perlis,
2017.
|
Subjects: | |
Online Access: | Link Metadata |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Usefulness and applications of entropy measurement / Muhamad Arif Hashim and Roshidi Din
by: Hashim, Muhamad Arif, et al.
Published: (2004) -
Sinkhole attack in IDS: detection and performance analysis for agriculture-based WSN using cooja network simulator / Iman Hazwam Abd Halim, Mohamad Hafiz Abdul Azziz and Mohd Faris Mohd Fuzi
by: Abd Halim, Iman Hazwam, et al.
Published: (2021) -
Noise enhancement method for speech signal processing / Muhamad Arif Hashim and Roshidi Din
by: Hashim, Muhamad Arif, et al.
Published: (2004) -
The impact of hiding information / Siti Khadijah Mazlan and Muhamad Faiz Muhamad Arif
by: Mazlan, Siti Khadijah, et al.
Published: (2014) -
Automated alert system for river water level and water quality assessment using telegram bot API / Iman Hazwam Abd Halim, Ammar Ibrahim Mahamad and Mohd Faris Mohd Fuzi
by: Abd Halim, Iman Hazwam, et al.
Published: (2021)