A survey of information security incident handling in the cloud NH Ab Rahman, KKR Choo computers & security 49, 45-69, 2015 | 253 | 2015 |
Forensic-by-design framework for cyber-physical cloud systems NH Ab Rahman, WB Glisson, Y Yang, KKR Choo IEEE Cloud Computing 3 (1), 2016 | 199 | 2016 |
Cloud incident handling and forensic‐by‐design: cloud storage as a case study NH Ab Rahman, NDW Cahyani, KKR Choo Concurrency and Computation: Practice and Experience 29 (14), e3868, 2017 | 109 | 2017 |
Face recognition for criminal identification: An implementation of principal component analysis for face recognition NA Abdullah, MJ Saidi, NHA Rahman, CC Wen, IRA Hamid AIP conference proceedings 1891 (1), 2017 | 75 | 2017 |
The role of mobile forensics in terrorism investigations involving the use of cloud storage service and communication apps NDW Cahyani, NHA Rahman, WB Glisson, KKR Choo Mobile Networks and Applications 22, 240-254, 2017 | 46 | 2017 |
Integrating digital forensic practices in cloud incident handling: A conceptual Cloud Incident Handling Model. NH Ab Rahman, KKR Choo The Cloud Security Ecosystem, 383-400, 2015 | 18 | 2015 |
Implications of emerging technologies to incident handling and digital forensic strategies: A Routine Activity Theory NH Ab Rahman, G Kessler, KKR Choo Contemporary Digital Forensic Investigations of Cloud and Mobile …, 2016 | 13 | 2016 |
The role of mobile forensics in terrorism investigations involving the use of cloud apps NDW Cahyani, NH Ab Rahman, Z Xu, WB Glisson, KKR Choo Proceedings of the 9th eai international conference on mobile multimedia …, 2016 | 12 | 2016 |
Android Malware classification using K-means Clustering algorithm IRA Hamid, NS Khalid, NA Abdullah, NH Ab Rahman, CC Wen IOP Conference Series: Materials Science and Engineering 226 (1), 012105, 2017 | 11 | 2017 |
An evidence‐based forensic taxonomy of Windows phone dating apps NDW Cahyani, KKR Choo, NH Ab Rahman, H Ashman Journal of forensic sciences 64 (1), 243-253, 2019 | 9 | 2019 |
Factors Influencing the Adoption of Cloud Incident Handling Strategy: A Preliminary Study in Malaysia NH Ab Rahman, KKR Choo arXiv preprint arXiv:1505.02908, 2015 | 7 | 2015 |
Keyword Indexing And Searching Tool (KIST): A Tool to Assist the Forensics Analysis of WhatsApp Chat SHS Nizam, NH Ab Rahman, NDW Cahyani International Journal on Information and Communication Technology (IJoICT) 6 …, 2020 | 6 | 2020 |
Comparison of data recovery techniques on master file table between Aho-Corasick and logical data recovery based on efficiency MLA Hussein Ismael Sahib, Nurul Hidayah Ab Rahman, Ali Kazem Al-Qaysi Telecommunication, Computing, Electronics and Control 19 (1), 73-78, 2021 | 5* | 2021 |
Email authentication using symmetric and asymmetric key algorithm encryption MAA Halim, CC Wen, I Rahmi, NA Abdullah, NHA Rahman AIP Conference Proceedings 1891 (1), 2017 | 5 | 2017 |
An evidence-based cloud incident handling framework NH Ab Rahman University of South Australia, 2016 | 5 | 2016 |
Privacy disclosure risk: smartphone user guide NHA Rahman International Journal of Mobile Network Design and Innovation 5 (1), 2-8, 2013 | 5 | 2013 |
An Evidence‐Based Forensic Taxonomy of Windows Phone Communication Apps NDW Cahyani, B Martini, KKR Choo, NH Ab Rahman, H Ashman Journal of forensic sciences 63 (3), 868-881, 2018 | 3 | 2018 |
Preserving anonymity in e-voting system using voter non-repudiation oriented scheme IRA Hamid, SNM Radzi, NHA Rahman, CC Wen, NA Abdullah AIP Conference Proceedings 1891 (1), 2017 | 3 | 2017 |
myEntropy: a file type identification tool using entropy scoring TX Hui, KM Mohamad, NHA Rahman International Journal of Electronic Security and Digital Forensics 14 (1), 76-95, 2022 | 2 | 2022 |
A Mobile Forensic Visualization Tool For Android Data Partition XQ Chow, NH Ab Rahman Applied Information Technology And Computer Science 2 (2), 37-52, 2021 | 2 | 2021 |