Skip to content
VuFind
Advanced
  • Search
  • Locating and collecting cyberc...
  • Cite this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
  • Permanent link
Locating and collecting cybercrime evidences on cloud storage: review

Locating and collecting cybercrime evidences on cloud storage: review

Despite the advancement of cloud storage and the benefits it brings to computer users, it cannot be denied that cloud storage is still subject to misuse by malicious users and cyber criminals. This includes the cases where criminals use cloud storage for storing and exchanging illegal material and f...

Full description

Bibliographic Details
Main Authors: Ahmed, Abdulghani Ali, Li, Chua Xue
Format: Conference or Workshop Item
Language:English
English
Published: IEEE 2017
Subjects:
QA76 Computer software
Online Access:http://umpir.ump.edu.my/id/eprint/18234/
http://umpir.ump.edu.my/id/eprint/18234/
http://umpir.ump.edu.my/id/eprint/18234/1/Locating%20and%20Collecting%20Cybercrime%20Evidences%20on%20Cloud%20Storage-%20Review.pdf
http://umpir.ump.edu.my/id/eprint/18234/2/Locating%20and%20Collecting%20Cybercrime%20Evidences%20on%20Cloud%20Storage-%20Review%201.pdf
  • Holdings
  • Description
  • Similar Items
  • Staff View

Internet

http://umpir.ump.edu.my/id/eprint/18234/
http://umpir.ump.edu.my/id/eprint/18234/
http://umpir.ump.edu.my/id/eprint/18234/1/Locating%20and%20Collecting%20Cybercrime%20Evidences%20on%20Cloud%20Storage-%20Review.pdf
http://umpir.ump.edu.my/id/eprint/18234/2/Locating%20and%20Collecting%20Cybercrime%20Evidences%20on%20Cloud%20Storage-%20Review%201.pdf

Similar Items

  • Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing
    by: Ahmed, Abdulghani Ali, et al.
    Published: (2017)
  • Investigation model for locating data remnants on cloud storage
    by: Khalid, Abdulrahman, et al.
    Published: (2019)
  • Analyzing Data Remnant Remains on User Devices to Determine Probative Artifacts in Cloud Environment
    by: Ahmed, Abdulghani Ali, et al.
    Published: (2018)
  • Review of access control mechanisms in cloud computing
    by: Muhammad Rizwan, Ghori, et al.
    Published: (2018)
  • MICIE: A model for identifying and collecting intrusion evidences
    by: Ahmed, Abdulghani Ali, et al.
    Published: (2017)

Search Options

  • Advanced Search

Find More

  • Browse the Catalog

Need Help?

  • Search Tips