Skip to content
VuFind
Advanced
  • MICIE: A model for identifying...
  • Cite this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
  • Permanent link
MICIE: A model for identifying and collecting intrusion evidences

MICIE: A model for identifying and collecting intrusion evidences

Today it is very important to maintain an intermediary level of security to ensure safe and trusted communication for daily usage. Secured data communication over internet and any other network is hard to achieve due to the threat of intrusions and misuse. Unfortunately, none of the existing systems...

Full description

Bibliographic Details
Main Authors: Ahmed, Abdulghani Ali, Kit, Yee Wai
Format: Conference or Workshop Item
Language:English
English
Published: IEEE 2017
Subjects:
QA76 Computer software
Online Access:http://umpir.ump.edu.my/id/eprint/18220/
http://umpir.ump.edu.my/id/eprint/18220/
http://umpir.ump.edu.my/id/eprint/18220/1/MICIE-%20A%20Model%20for%20Identifying%20and%20Collecting%20Intrusion%20Evidences.pdf
http://umpir.ump.edu.my/id/eprint/18220/2/MICIE-%20A%20Model%20for%20Identifying%20and%20Collecting%20Intrusion%20Evidences%201.pdf
  • Holdings
  • Description
  • Similar Items
  • Staff View

Internet

http://umpir.ump.edu.my/id/eprint/18220/
http://umpir.ump.edu.my/id/eprint/18220/
http://umpir.ump.edu.my/id/eprint/18220/1/MICIE-%20A%20Model%20for%20Identifying%20and%20Collecting%20Intrusion%20Evidences.pdf
http://umpir.ump.edu.my/id/eprint/18220/2/MICIE-%20A%20Model%20for%20Identifying%20and%20Collecting%20Intrusion%20Evidences%201.pdf

Similar Items

  • Locating and collecting cybercrime evidences on cloud storage: review
    by: Ahmed, Abdulghani Ali, et al.
    Published: (2017)
  • From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
    by: Shahid, Anwar, et al.
    Published: (2017)
  • Investigation Model for Ddos Attack Detection in Real-Time
    by: Ahmed, Abdulghani Ali
    Published: (2015)
  • Filtration Model For DDoS Attack Detection in Real-Time
    by: Ahmed, Abdulghani Ali
    Published: (2015)
  • Intrusion Response Systems: Foundations, Design, and Challenges
    by: Zakira, Inayat, et al.
    Published: (2016)

Search Options

  • Advanced Search

Find More

  • Browse the Catalog

Need Help?

  • Search Tips
Cannot write session to /tmp/vufind_sessions/sess_a7hija9tu0q48jhj469enephur