Displaying publications 41 - 45 of 45 in total

Abstract:
Sort:
  1. Khan S, Shiraz M, Wahab AW, Gani A, Han Q, Rahman ZB
    ScientificWorldJournal, 2014;2014:547062.
    PMID: 25097880 DOI: 10.1155/2014/547062
    Network forensics enables investigation and identification of network attacks through the retrieved digital content. The proliferation of smartphones and the cost-effective universal data access through cloud has made Mobile Cloud Computing (MCC) a congenital target for network attacks. However, confines in carrying out forensics in MCC is interrelated with the autonomous cloud hosting companies and their policies for restricted access to the digital content in the back-end cloud platforms. It implies that existing Network Forensic Frameworks (NFFs) have limited impact in the MCC paradigm. To this end, we qualitatively analyze the adaptability of existing NFFs when applied to the MCC. Explicitly, the fundamental mechanisms of NFFs are highlighted and then analyzed using the most relevant parameters. A classification is proposed to help understand the anatomy of existing NFFs. Subsequently, a comparison is given that explores the functional similarities and deviations among NFFs. The paper concludes by discussing research challenges for progressive network forensics in MCC.
    Matched MeSH terms: Forensic Sciences/methods*
  2. Syamsa RA, Ahmad FM, Marwi MA, Zuha RM, Omar B
    Med J Malaysia, 2010 Sep;65(3):192-5.
    PMID: 21939166 MyJurnal
    This study reviews forensic entomological specimens analysed by the Department of Parasitology & Medical Entomology, Universiti Kebangsaan Malaysia for the year 2004. A total of 10 cases (6 males and 4 females) were observed for the entomological specimens. Various types of death scenes were obtained including indoor and outdoor area such as bushes field, rubbish dumping site, and aquatic areas. Identified fly species collected from the death sites were blow flies, Chrysomya megacephala, Chrysomya rufifacies and Lucilia cuprina and unknown sarcophagid larvae, with Ch. megacephala being the most common species found in the ecologically varied death scene habitats. The post-mortem interval (PMI) estimation ranged from one to five days, based on the entomological specimens collected.
    Matched MeSH terms: Forensic Sciences*
  3. Ali A, Abd Razak S, Othman SH, Mohammed A, Saeed F
    PLoS One, 2017;12(4):e0176223.
    PMID: 28445486 DOI: 10.1371/journal.pone.0176223
    With the rapid development of technology, mobile phones have become an essential tool in terms of crime fighting and criminal investigation. However, many mobile forensics investigators face difficulties with the investigation process in their domain. These difficulties are due to the heavy reliance of the forensics field on knowledge which, although a valuable resource, is scattered and widely dispersed. The wide dispersion of mobile forensics knowledge not only makes investigation difficult for new investigators, resulting in substantial waste of time, but also leads to ambiguity in the concepts and terminologies of the mobile forensics domain. This paper developed an approach for mobile forensics domain based on metamodeling. The developed approach contributes to identify common concepts of mobile forensics through a development of the Mobile Forensics Metamodel (MFM). In addion, it contributes to simplifying the investigation process and enables investigation teams to capture and reuse specialized forensic knowledge, thereby supporting the training and knowledge management activities. Furthermore, it reduces the difficulty and ambiguity in the mobile forensics domain. A validation process was performed to ensure the completeness and correctness of the MFM. The validation was conducted using two techniques for improvements and adjustments to the metamodel. The last version of the adjusted metamodel was named MFM 1.2.
    Matched MeSH terms: Forensic Sciences/methods*
  4. Yang TY, Dehghantanha A, Choo KK, Muda Z
    PLoS One, 2016;11(3):e0150300.
    PMID: 26982207 DOI: 10.1371/journal.pone.0150300
    Instant messaging (IM) has changed the way people communicate with each other. However, the interactive and instant nature of these applications (apps) made them an attractive choice for malicious cyber activities such as phishing. The forensic examination of IM apps for modern Windows 8.1 (or later) has been largely unexplored, as the platform is relatively new. In this paper, we seek to determine the data remnants from the use of two popular Windows Store application software for instant messaging, namely Facebook and Skype on a Windows 8.1 client machine. This research contributes to an in-depth understanding of the types of terrestrial artefacts that are likely to remain after the use of instant messaging services and application software on a contemporary Windows operating system. Potential artefacts detected during the research include data relating to the installation or uninstallation of the instant messaging application software, log-in and log-off information, contact lists, conversations, and transferred files.
    Matched MeSH terms: Forensic Sciences*
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links