Raihana Md Saidi

  • Citations Per Year
Learn More
Cyber attack comes in various approach and forms, either internally or externally. Remote access and spyware are forms of cyber attack leaving an organization to be susceptible to vulnerability. This paper investigates illegal activities and potential evidence of cyber attack through studying the registry on the Windows 7 Home Premium (32 bit) Operating(More)
Nowadays, virtual world turned to be more important and total number of Internet users in the world had increase over the years. Online banking, ticketing, trading and businesses are all over the Internet. Due to that, web services have become important than ever. Web servers that provide services must maintain the reliability and maintain tolerable in(More)
Spyware is considered as a great threat to confidentiality that it can cause loss of control over private data for computer users. This kind of threat might select some data and send it to another third party without the consent of the user. Spyware detection techniques have been presented traditionally by three approaches; signature, behavior and(More)
Voice over internet protocols (VoIP)'s quality communication relies significantly on the network; however guarantee the best quality of the traffic is difficult. This paper analyzes the performance of VoIP traffic in Border Gateway Protocol (BGP) -Multiprotocol Label Switching (MPLS) IP Virtual Private Network (VPN) between two interior routing protocols(More)
  • 1