ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Proceeding

The International Conference on Information Security and Cyber Forensics (InfoSec)

Publisher: The Society of Digital Information and Wireless Communications (SDIWC)

Editors: Dr. Fadhilah Ahmad

ISBN: 978-1-941968-01-7

Date: 2014-10-08 - 2014-10-10

Conference Venue: Kuala Terengganu, Malaysia Malaysia

Proceeding URL: http://sdiwc.net/digital-library/browse/91external

  1. Authentication using Audio Key Phrase Integrated with Random Number Generated Keypad

    Authors: Herny Ramadhani/Mohd Husny Hamid; Norhaiza/Ya Abdullah; Wan Hazimah/Wan Ismail

  2. Is the Security Bubble Within the Banking Sector About to BURST?

    Authors: Mumina/Uddin; Ameer/Al-Nemrat

  3. ant-CBIR: A New Method for Radial Furrow Extraction in Iris Biometric

    Authors: Zaheera/Zainal Abidin; Mazani/Manaf; Abdul Samad/Shibghatullah

  4. Development and Trial Application of a Continuity Operation Plan Support System for an Information Technology System

    Authors: Ichiro/Matsunaga; Ryoichi/Sasaki

  5. A Critical Analysis of the Effectiveness of Cyber Security Defenses in UAE Government Agencies

    Authors: Abdulla/Al Neaimi; Tago/Ranginya; Philip/Lutaaya

  6. Method for Estimating Unjust Communication Causes Using Network Packets Associated with Process Information

    Authors: Satoshi/Mimura; Ryoichi/Sasaki

  7. Extension and Evaluation of Guideline Total Support System for Digital Forensics

    Authors: Takamichi/Amano; Tetsutaro/Uehara; Ryoichi/Sasaki

  8. Cyber Defamation: A Comparative Analysis of the Legal Position in Malaysia and the United Kingdom

    Authors: Khairun-Nisaa/Asari; Nazli Ismail/Nawang

  9. Opening the "Private Browsing" Data - Acquiring Evidence of Browsing Activities

    Authors: Rodrigo de S./Ruiz; Fernando/Pompeo Amatte; Kil Jin Brandini/Park D. Sc.

  10. User Centric Trusted Log Archival Architecture in Cloud Computing Environments

    Authors: Takashi/Shitamichi; Ryoichi/Sasaki

  11. A Second Look at the Information Security Awareness among Secondary School Students

    Authors: Saida Issa/Al-Jerbie; Mohd Zalisham/Jali

  12. Developing Cyber Forensics for SCADA Industrial Control Systems

    Authors: Joe/Stirland; Kevin/Jones; Helge/Janicke; Tina/Wu

  13. A Study of AODV Friendship Mechanism in Mobile Adhoc Network Trust Feature

    Authors: Hatim/Mohamad Tahir; Abas/Md Said