Learn More
Universal Mobile Telecommunications System is the third generation mobile communications system. It was built on the concepts of GSM and is the starting point in the development of the fourth generation network. This paper proposes enhancements for the initial identification and for the Authentication and Key Agreement (AKA) protocols that solve two known(More)
This paper focuses on the security of Internet access over the third generation mobile telecommunication networks. We explore the characteristics of cryptographic attacks and the similarities between the exposures of different secret keys in cryptographic attacks and propose three measures that limit the exposure of the sensible secret key. These measures(More)
This paper presents machine learning anti-phishing technique (MLAPT) - a machine learning framework that applies knowledge intensive approach to detect and prevent phishing attacks on email systems. Preventions, detections and a higher level of prevention measure can be guaranteed. The system is evaluated against a database of human-judged phishing(More)
The Internet worm infects the computer system, network packet, communication performance, and the traditional method of managing network using SNMP to monitor abnormal network traffic. To monitor suspicious Internet activity and to recognise the Internet worm categories, we proposed FloWorM system that can reduce the misjudgment and detection rate based on(More)
In modern digital investigations, forensic sensitive information can be gathered from the physical memory of computer systems. Digital forensic community feels the urge towards accurate data collection, preservation, examination, validation, data analysis and presentation. This investigative process has become an essential part of digital investigation. The(More)
The Web Service has been extended to the back-end database. In this paper, we propose a novel method of user behavior analysis in semantic network. We use the weight value to analyze and record user behavior and then check user behavior record with the signatures which are generated by the Intrusion Detection System (IDS). If a user record matches with(More)
E-learning allows us to learn anywhere, any place and any time as long as there is access to a configured computer system. E-learning can be network-based, intranet-based, internet-based, cd/dvd-based. It can include audio, video, text, animation and virtual environments. However, the increase of e-learning tools by allowing the creation learning(More)
In this paper, we present the method of investigating and extracting forensically relevant information from the physical memory of Windows systems. This approach revealed the extracted evidence dispersed in the physical memory of an application. The result shows a coherent view of user input on applications with over 96% of user input stored on Word and 94%(More)
The purpose of this study is to identify the key security issues within the context of software based VoIP (Voice over Internet Protocol) which are engaged in the process of data exchange on the converged networks. There is no one single solution for VoIP security; it is all depended on the type of customers, existing IT environment and carriers. In order(More)