|
|
|
Avinash Singh, Richard Adeyemi Ikuesan and Hein Venter
The growing sophistication of malware has resulted in diverse challenges, especially among security researchers who are expected to develop mechanisms to thwart these malicious attacks. While security researchers have turned to machine learning to combat...
ver más
|
|
|
|
|
|
|
Bako Zawali, Richard A. Ikuesan, Victor R. Kebande, Steven Furnell and Arafat A-Dhaqm
Complexity and sophistication among multimedia-based tools have made it easy for perpetrators to conduct digital crimes such as counterfeiting, modification, and alteration without being detected. It may not be easy to verify the integrity of video conte...
ver más
|
|
|
|
|
|
|
Arafat Al-Dhaqm, Shukor Razak, Richard A. Ikuesan, Victor R. Kebande and Siti Hajar Othman
Using a face validity approach, this paper provides a validation of the Database Forensic Investigation Metamodel (DBFIM). The DBFIM was developed to solve interoperability, heterogeneity, complexity, and ambiguity in the database forensic investigation ...
ver más
|
|
|
|