Learn More
— Digital forensic is part of forensic science that implicitly covers crime that is related to computer technology. In a cyber crime, digital evidence investigation requires a special procedures and techniques in order to be used and be accepted in court of law. Generally, the goals of these special processes are to identify the origin of the incident(More)
Intrusion alert correlation is multi-step processes that receives alerts from heterogeneous log resources as input and produce a high-level description of the malicious activity on the network. The objective of this study is to analyse the current alert correlation technique and identify the significant criteria in each technique that can improve the(More)
Digital forensics is essential for the successful prosecution of digital criminals which involve diverse digital devices such as computer system devices, network devices, mobile devices and storage devices. The digital forensic investigation must be retrieved to obtain the evidence that will be accepted in the court of law. Therefore, for digital forensic(More)
Image projection is usually associated with image enlargement projected on screen or large display devices. The objective of this paper is to achieve sharper image projection and thinner transition over the edge. Tchebichef moment has been chosen here since it performs better than the popular Discrete Cosine Transform. This transform integrates a simplified(More)
The proliferation of Android-based mobile devices and mobile applications in the market has triggered the malware author to make the mobile devices as the next profitable target. With user are now able to use mobile devices for various purposes such as web browsing, ubiquitous services, online banking, social networking, MMS and etc, more credential(More)
Super-resolution is a set of methods of increasing or doubling image resolution. Super-resolution algorithms can be divided into frequency or space domain. In this paper, a simple technique shall be applied in both space and frequency domain of an image. This transform integrates a simplified mathematical framework technique using matrices, as well as a(More)
IPv6 technology introduced to solve problems in the previous IPv4 technology. New threats were discovered due to the exploitation of flaws in IPv6 architecture design. There is a demand to produce new intrusion detection technique for new threats of IPv6 network environment. In this paper, the method of features selection to produce the most significant(More)
Technical security metrics provide measurements in ensuring the effectiveness of technical security controls or technology devices/objects that are used in protecting the information systems. However, lack of understanding and method to develop the technical security metrics may lead to unachievable security control objectives and inefficient(More)