Proposed computer forensic approach for cloud computing environment
The security perimeter in computing has changed from a fixed boundary to an elastic boundary that is constantly changing and also the threats are evolving, making the Incident handler more difficult to analyze the information system based attacks. Therefore, the purposes of this study are introducin...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Published: |
American Scientific Publishers
2016
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/71771/ https://www.scopus.com/inward/record.uri?eid=2-s2.0-85009110696&doi=10.1166%2fasl.2016.8011&partnerID=40&md5=14f748e801c47001270d33e86602a791 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|