Skip to content
VuFind
Advanced
  • Search
  • Investigation model for locati...
  • Cite this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
  • Permanent link
Investigation model for locating data remnants on cloud storage

Investigation model for locating data remnants on cloud storage

Cloud storage services allow users to store their data online and remotely access, maintain, manage, and back up their data from anywhere through the Internet. Although this storage is helpful, it challenges digital forensic investigators and practitioners in collecting, identifying, acquiring, and...

Full description

Bibliographic Details
Main Authors: Khalid, Abdulrahman, Ahmed, Abdulghani Ali, Mohammed, Muamer N.
Format: Conference or Workshop Item
Language:English
English
Published: Springer Nature Switzerland 2019
Subjects:
QA76 Computer software
Online Access:http://umpir.ump.edu.my/id/eprint/24829/
http://umpir.ump.edu.my/id/eprint/24829/
http://umpir.ump.edu.my/id/eprint/24829/
http://umpir.ump.edu.my/id/eprint/24829/1/22.%20Investigation%20Model%20for%20Locating%20Data%20Remnants%20on%20Cloud%20Storage.pdf
http://umpir.ump.edu.my/id/eprint/24829/2/22.1%20Investigation%20Model%20for%20Locating%20Data%20Remnants%20on%20Cloud%20Storage.pdf
  • Holdings
  • Description
  • Similar Items
  • Staff View

Internet

http://umpir.ump.edu.my/id/eprint/24829/
http://umpir.ump.edu.my/id/eprint/24829/
http://umpir.ump.edu.my/id/eprint/24829/
http://umpir.ump.edu.my/id/eprint/24829/1/22.%20Investigation%20Model%20for%20Locating%20Data%20Remnants%20on%20Cloud%20Storage.pdf
http://umpir.ump.edu.my/id/eprint/24829/2/22.1%20Investigation%20Model%20for%20Locating%20Data%20Remnants%20on%20Cloud%20Storage.pdf

Similar Items

  • Locating and collecting cybercrime evidences on cloud storage: review
    by: Ahmed, Abdulghani Ali, et al.
    Published: (2017)
  • Analyzing Data Remnant Remains on User Devices to Determine Probative Artifacts in Cloud Environment
    by: Ahmed, Abdulghani Ali, et al.
    Published: (2018)
  • Investigation Model for Ddos Attack Detection in Real-Time
    by: Ahmed, Abdulghani Ali
    Published: (2015)
  • Review of access control mechanisms in cloud computing
    by: Muhammad Rizwan, Ghori, et al.
    Published: (2018)
  • Fault Tolerance Impact on Near Field Communication for Data Storage of Mobile Commerce Technology in Cloud Computing
    by: Noraziah, Ahmad, et al.
    Published: (2015)

Search Options

  • Advanced Search

Find More

  • Browse the Catalog

Need Help?

  • Search Tips