ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Proceeding

The Third International Conference on Digital Security and Forensics (DigitalSec2016)

Publisher: The Society of Digital Information and Wireless Communications (SDIWC)

Editors: Andy Seddon

ISBN: 978-1-941968-37-6

Date: 2016-09-06

Conference Venue: Kuala Lumpur, Malaysia Malaysia

Proceeding URL: http://sdiwc.net/digital-library/browse/142external

  1. An Evidence Collection and Analysis of Ubuntu File System

    Authors: Dinesh Patil;Bandu Meshram

  2. Utilizing Program's Execution Data for Digital Forensics

    Authors: Ziad Al-Sharif

  3. Systems in Danger: A Short Review on Metamorphic Computer Viruses

    Authors: Seyed Amirhossein Mousavi;Babak Bashari Rad;Teh Ying Wah

  4. Application and Evaluation of Method for Establishing Consensus on Measures Based on Cybersecurity Framewor

    Authors: Shota Fukushima;Ryoichi Sasaki

  5. Development and Evaluation of a Dynamic Security Evaluation System for the Cloud System Operation

    Authors: Motoharu Sekine;Yuki Ashino;Shigeyoshi Shima;Yoshimi Teshigawara;Ryoichi Sasaki

  6. Proposal of an Improved Event Tree and Defense Tree Combined Method for Risk Evaluation with Common Events

    Authors: Ryo Aihara;Ryohei Ishii;Ryoichi Sasaki

  7. Proposal of Unified Data Management and Recovery Tool Using Shadow Copy

    Authors: Naoki Matsutaka;Masato Eguchi;Takuya Okazaki;Tahashi Matsumoto;38;Ryoichi Sasaki;Tadashi Kimura;Ryoichi Sasaki

  8. Countermeasure against Drive by Download Attack by Analyzing Domain Information

    Authors: Tadashi Kimura;Ryoichi Sasaki

  9. Fingerprinting Violating Machines with TCP Timestamps

    Authors: Mohammed Al-Saleh

  10. Method for Detecting a Malicious Domain by Using WHOIS and DNS Features

    Authors: Masahiro Kuyama;Yoshio Kakizaki;Ryoichi Sasaki

  11. Awareness of Cloud Storage Forensics amongst the Malaysian Users

    Authors: Yee Say Keat;Babak Bashari Rad;Mohammad Ahmadi

  12. Filtering Avoidance Using Web Translation Service and its Countermeasures

    Authors: Ryota Suzuki;Atsuo Inomata;Ryoichi Sasaki

  13. Using Mutual Information for Feature Selection in Network Intrusion Detection System

    Authors: Mohammed A. Ambusaidi

  14. Cloud Authentication Logic on Data Security

    Authors: Maryam Shahpasand;Muhammad Ehsan Rana;Ramlan Mahmod;Nur Izura Udzir

  15. Privacy and Security Challenges in Cloud Based Electronic Health Record: Towards Access Control Model

    Authors: Micheal Kubbo;Manoj Jayabalan;Muhammad Ehsan Rana