Follow
Ab Rahman, N H
Title
Cited by
Cited by
Year
A survey of information security incident handling in the cloud
NH Ab Rahman, KKR Choo
computers & security 49, 45-69, 2015
2532015
Forensic-by-design framework for cyber-physical cloud systems
NH Ab Rahman, WB Glisson, Y Yang, KKR Choo
IEEE Cloud Computing 3 (1), 2016
1992016
Cloud incident handling and forensic‐by‐design: cloud storage as a case study
NH Ab Rahman, NDW Cahyani, KKR Choo
Concurrency and Computation: Practice and Experience 29 (14), e3868, 2017
1092017
Face recognition for criminal identification: An implementation of principal component analysis for face recognition
NA Abdullah, MJ Saidi, NHA Rahman, CC Wen, IRA Hamid
AIP conference proceedings 1891 (1), 2017
752017
The role of mobile forensics in terrorism investigations involving the use of cloud storage service and communication apps
NDW Cahyani, NHA Rahman, WB Glisson, KKR Choo
Mobile Networks and Applications 22, 240-254, 2017
462017
Integrating digital forensic practices in cloud incident handling: A conceptual Cloud Incident Handling Model.
NH Ab Rahman, KKR Choo
The Cloud Security Ecosystem, 383-400, 2015
182015
Implications of emerging technologies to incident handling and digital forensic strategies: A Routine Activity Theory
NH Ab Rahman, G Kessler, KKR Choo
Contemporary Digital Forensic Investigations of Cloud and Mobile …, 2016
132016
The role of mobile forensics in terrorism investigations involving the use of cloud apps
NDW Cahyani, NH Ab Rahman, Z Xu, WB Glisson, KKR Choo
Proceedings of the 9th eai international conference on mobile multimedia …, 2016
122016
Android Malware classification using K-means Clustering algorithm
IRA Hamid, NS Khalid, NA Abdullah, NH Ab Rahman, CC Wen
IOP Conference Series: Materials Science and Engineering 226 (1), 012105, 2017
112017
An evidence‐based forensic taxonomy of Windows phone dating apps
NDW Cahyani, KKR Choo, NH Ab Rahman, H Ashman
Journal of forensic sciences 64 (1), 243-253, 2019
92019
Factors Influencing the Adoption of Cloud Incident Handling Strategy: A Preliminary Study in Malaysia
NH Ab Rahman, KKR Choo
arXiv preprint arXiv:1505.02908, 2015
72015
Keyword Indexing And Searching Tool (KIST): A Tool to Assist the Forensics Analysis of WhatsApp Chat
SHS Nizam, NH Ab Rahman, NDW Cahyani
International Journal on Information and Communication Technology (IJoICT) 6 …, 2020
62020
Comparison of data recovery techniques on master file table between Aho-Corasick and logical data recovery based on efficiency
MLA Hussein Ismael Sahib, Nurul Hidayah Ab Rahman, Ali Kazem Al-Qaysi
Telecommunication, Computing, Electronics and Control 19 (1), 73-78, 2021
5*2021
Email authentication using symmetric and asymmetric key algorithm encryption
MAA Halim, CC Wen, I Rahmi, NA Abdullah, NHA Rahman
AIP Conference Proceedings 1891 (1), 2017
52017
An evidence-based cloud incident handling framework
NH Ab Rahman
University of South Australia, 2016
52016
Privacy disclosure risk: smartphone user guide
NHA Rahman
International Journal of Mobile Network Design and Innovation 5 (1), 2-8, 2013
52013
An Evidence‐Based Forensic Taxonomy of Windows Phone Communication Apps
NDW Cahyani, B Martini, KKR Choo, NH Ab Rahman, H Ashman
Journal of forensic sciences 63 (3), 868-881, 2018
32018
Preserving anonymity in e-voting system using voter non-repudiation oriented scheme
IRA Hamid, SNM Radzi, NHA Rahman, CC Wen, NA Abdullah
AIP Conference Proceedings 1891 (1), 2017
32017
myEntropy: a file type identification tool using entropy scoring
TX Hui, KM Mohamad, NHA Rahman
International Journal of Electronic Security and Digital Forensics 14 (1), 76-95, 2022
22022
A Mobile Forensic Visualization Tool For Android Data Partition
XQ Chow, NH Ab Rahman
Applied Information Technology And Computer Science 2 (2), 37-52, 2021
22021
The system can't perform the operation now. Try again later.
Articles 1–20