Shahrin bin Sahib

Learn More
— Digital forensic is part of forensic science that implicitly covers crime that is related to computer technology. In a cyber crime, digital evidence investigation requires a special procedures and techniques in order to be used and be accepted in court of law. Generally, the goals of these special processes are to identify the origin of the incident(More)
Digital forensics is essential for the successful prosecution of digital criminals which involve diverse digital devices such as computer system devices, network devices, mobile devices and storage devices. The digital forensic investigation must be retrieved to obtain the evidence that will be accepted in the court of law. Therefore, for digital forensic(More)
Intrusion alert correlation is multi-step processes that receives alerts from heterogeneous log resources as input and produce a high-level description of the malicious activity on the network. The objective of this study is to analyse the current alert correlation technique and identify the significant criteria in each technique that can improve the(More)
IPv6 technology introduced to solve problems in the previous IPv4 technology. New threats were discovered due to the exploitation of flaws in IPv6 architecture design. There is a demand to produce new intrusion detection technique for new threats of IPv6 network environment. In this paper, the method of features selection to produce the most significant(More)
The existence of a network relies mainly upon the performance of the network. In order to improve the performance of a network, the total quality of connections plays a vital role. Quality of Service is the base of which the network's efficiency could be measured. At the transport layer two different protocols are available: TCP and UDP. TCP provides a(More)
Technical security metrics provide measurements in ensuring the effectiveness of technical security controls or technology devices/objects that are used in protecting the information systems. However, lack of understanding and method to develop the technical security metrics may lead to unachievable security control objectives and inefficient(More)
Purpose – Information security has become an essential entity for organizations across the globe to eliminate the possible risks in their organizations by conducting information security risk assessment (ISRA). However, the existence of numerous different types of risk assessment methods, standards, guidelines and specifications readily available causes the(More)
M-Learning has a potential to improve efficiency in the education sector and has a tendency to grow advance and transform the learning environment in the future. Yet there are challenges in many areas faced when introducing and implementing m-learning. The learner centered attribute in mobile learning implies deployment in untrustworthy learning(More)
Organizational L earning (OL) is about managing knowledge related to the implementation of information system or information and communication technology (IS/ICT) applications for creating such knowledge-based management operation. One of the IS/ICT applications is an electronic mail (email). Email is a communication tool for enabling supportive platform(More)
Time series prediction or forecasting is an important area of research in various fields of science and engineering. Predictability refers to the degree that a correct forecasting of a time series can be made. Prediction can be erroneous; so it is important to know the predictability of the time series before going for prediction. In this paper six new(More)