Vrizlynn L. L. Thing

Learn More
In this paper, we proposed an automated system to perform a live memory forensic analysis for mobile phones. We investigated the dynamic behavior of the mobile phone’s volatile memory, and the analysis is useful in real-time evidence acquisition analysis of communication based applications. Different communication scenarios with varying parameters were(More)
DoS/DDoS attacks constitute one of the major classes of security threats in the Internet today. The attackers usually use IP spoofing to conceal their real location. The current Internet protocols and infrastructure do not provide intrinsic support to traceback the real attack sources. The objective of IP Traceback is to determine the real attack sources,(More)
Denial of Service (DoS) and Distributed DoS attacks constitute a major class of security threats today. As the attackers usually use IP spoofing to conceal their real location, several IP Traceback mechanisms have been proposed to trace the true source of the attackers to institute accountability. In wireless ad-hoc networks, where the nodes are typically(More)
Recent years have seen a global adoption of smart mobile devices, particularly those based on Android. However, Android’s widespread adoption is marred with increasingly rampant malware threats. This article gives a survey and taxonomy of existing works that secure Android devices. Based on Android app deployment stages, the taxonomy enables us to(More)
A novel channel-allocation method that allows reduction of the four-wave mixing (FWM) effect while maintaining bandwidth efficiency is presented. It is composed of a fractional bandwidth-allocation algorithm, taking into consideration the use of parameters with distinct differences. This proposed technique allows the computation of an optimal(More)
Author profiling can be considered a form of text analysis of which the objective is to ascertain characteristics of the author behind a text sample. This paper describe the design and implementation of an approach for determining the age group (10s, 20s, or 30s) and gender (male/female) of text samples for the author profiling task in PAN 2013. Evaluation(More)
In recent years, we have seen the arrival of Distributed Denial-ofService (DDoS) open-source bot-based attack tools facilitating easy code enhancement, and so resulting in attack tools becoming more powerful. Developing new techniques for detecting and responding to the latest DDoS attacks often entails using attack traces to determine attack signatures and(More)