Proposed computer forensic approach for cloud computing environment

The security perimeter in computing has changed from a fixed boundary to an elastic boundary that is constantly changing and also the threats are evolving, making the Incident handler more difficult to analyze the information system based attacks. Therefore, the purposes of this study are introducin...

Full description

Saved in:
Bibliographic Details
Main Authors: Ahmed, M., Samy, G. N., Maarop, N., Shanmugam, B., Magalingam, P., Ahmad, R.
Format: Article
Published: American Scientific Publishers 2016
Subjects:
Online Access:http://eprints.utm.my/id/eprint/71771/
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85009110696&doi=10.1166%2fasl.2016.8011&partnerID=40&md5=14f748e801c47001270d33e86602a791
Tags: Add Tag
No Tags, Be the first to tag this record!