Digital forensic investigation of trojan attacks in network using wireshark, FTK imager and volatility / Muhamad Arif Hashim ... [et al.]
Trojan attacks are the most common and serious threat to network users. It is a program that appears to be useful program but actually harmful one. It is difficult to detect Trojan attacks because it uses special techniques to conceal its activities from antiviruses and users. Thus, this research in...
Saved in:
Main Authors: | Hashim, Muhamad Arif, Abd Halim, Iman Hazwam, Ismail, Mohammad Hafiz, Mohd Noor, Norfaizalfarid, Mohd Fuzi, Mohd Faris, Mohammed, Abdul Hapes, JM. Gining, Ray Adderley |
---|---|
Format: | Article |
Language: | English |
Published: |
UiTM Cawangan Perlis
2017
|
Subjects: | |
Online Access: | https://ir.uitm.edu.my/id/eprint/54361/1/54361.pdf https://ir.uitm.edu.my/id/eprint/54361/ https://crinn.conferencehunter.com/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Detecting brute force attacks and analyzing network traffic using Wireshark / Nur Khaira Ahmad Shah
by: Ahmad Shah, Nur Khaira
Published: (2022) -
Performance analysis of open-source network monitoring software in wireless network / Mohd Faris Mohd Fuzi ... [et al.]
by: Mohd Fuzi, Mohd Faris, et al.
Published: (2023) -
Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.]
by: Mohd Fuzi, Mohd Faris, et al.
Published: (2023) -
Performance analysis of network intrusion detection using T-Pot honeypots / Mohd Faris Mohd Fuzi ... [et al.]
by: Mohd Fuzi, Mohd Faris, et al.
Published: (2024) -
The performance analysis of malware attack / Nur Khairani Kamarudin ... [et al.]
by: Kamarudin, Nur Khairani, et al.
Published: (2018)