Journal & Conference Proceeding Publications

Get latest Journal & Conference Proceeding Publications related to Cybersecurity Malaysia here

 
Share this page :
CSC 0023
Multiple-Frames Super-Resolution for Closed Circuit Television Forensics
Nazri Ahmad Zamani; Mohammad Zaharudin Ahmad Darus; Siti Norul Huda Sheikh Abdullah; Md Jan Nordin
CCTV forensics is a very challenging task as video files seized from a CCTV DVR can be in a detrimental state with bad lighting ambience, noise, blurring due to optical settings and motion, compression artefacts, interlaces and low-resolved frame size to name a few. This always results in the difficulties in analyzing subjects in the video which are subjected to investigation. We present a multiple-frames Super-Resolution technique by combining a sequence of video frames of a subject in order to create a super-resolved frame of the subject with increased resolution and clarities. For that purpose, we used Projection onto Convex Sets (POCS) method for the super-resolution. For estimating the shift and rotational parameters of frames for the POCS we used Keren for that purpose. This process is tested with real footage of CCTV video which we did simulation on a crime scene. From the experiments we conducted, the results found are far exceeding in quality than conventional image re-sampling methods.
Year published : 2011 | 36-40 | IEEE Conference Proceeding
Publication : International Conference on Pattern Analysis and Intelligent Robotics
CSC 0052
Non Intrusive SSL/TLS Proxy with JSON Based Policy
Suhairi Mohd Jawi, Fakariah Hani Mohd Ali & Nurul Huda Nik Zulkipli
The placement of an interception proxy in between a client and web server has its own implications. Therefore, it is more practical to take a “middle” approach that can moderate the ongoing and future SSL/TLS sessions while not compromising the user privacy. A policy rule in JSON schema and data is proposed in handling SSL/TLS connection delegated by a non-intrusive, pass-through proxy.
Year published : February 2015
Publication : Lecture Notes in Electrical Engineering Volume 339
CSC 0060
Non-Intrusive SSL/TLS Proxy Using JSON Data
Suhairi Mohd Jawi & Fakariah Hani Mohd Ali
The implementation of an adaptive, non-intrusive proxy in between a client and SSL/TLS web server using more practical and “middle” approach that can moderate the ongoing and future SSL/TLS sessions. The aim is not to compromise user privacy. Policy rules in JSON schema and JSON data are proposed in handling SSL/TLS connection. This paper extends the implementation of the proxy using Perl language and currently available tools, data repository and techniques.
Year published : December 2015
Publication : 2015 IEEE Student Conference on Research and Development (SCOReD)
CSC 0011
Object Signature Search for Capturing Processes Memory Image of Windows System
Khairul Akram Zainol Ariffin; Ahmad Kamil Mahmood; Jafrezal Jaafar; Dr Solahuddin Shamsuddin
Over the past few years, memory analysis has been an issue that has been discussed in digital forensics. With the introduction of cloud computing, the on memory has become critical as the hard disk is no longer the primary choice to store information and data on the computer system. The online storages with password protected such as ADrive, Dropbox and Google Cloud Storage are already available to all users. Hence, with the progress of development in this technology, the traditional approach (analysis on hard drive) has become obsolete in obtaining information from those applications. The aim of this paper is to present an algorithm that can be used to trace the processes of the memory image. The algorithm uses the signature search to find the possible process that is stored in the memory dump. Then, by the information in Parent ProcessID (PPID) and ProcessID (PID) the Process Block Tree is constructed. Further, the benchmarking test between Process Enumeration technique and this new algorithm is presented in this paper
Year published : 2013 | 702-705 | Volume 2 Number 3
Publication : International Journal of Computer and Communication Engineering
CSC 0004
Perception on Cyber Terrorism : A Focus Group Discussion Approach
Rabiah Ahmad; Zahri Yunos; Shahrin Sahib and Mariana Yusoff
Focus group discussion is an exploratory research technique used to collect data through group interaction. This technique provides the opportunity to observe interaction among participants on a topic under this study. This paper contributes to an understanding on the cyber terrorism conceptual framework through the analysis of focus group discussion. The proposed cyber terrorism conceptual framework which was obtained during the qualitative study by the authors has been used as a basis for discussion in the focus group discussion. Thirty (30) participants took part in the focus group discussion. The overall results suggest that the proposed cyber terrorism framework is acceptable by the participants. The present study supports our initial research that the cyber terrorism conceptual framework constitutes the following components: target, motivation, tools of attack, domain, methods of attack and impact.
Year published : 2012 | 231-237 | Vol. 3 No. 3
Publication : Journal of Information Security
logo
CyberSecurity Malaysia is the national cyber security specialist agency under the purview of the Ministry of Digital (KD)
 
Contact Us

  • CyberSecurity Malaysia,
    Level 7 Tower 1, Menara Cyber Axis, Jalan Impact,
    63000 Cyberjaya, Selangor Darul Ehsan, Malaysia.

  • enquiry@cybersecurity.my

  • +603 - 8800 7999

  • +603 - 8008 7000

TOP
ASK Byte
Chatbot Portal

Hi, I am ASK Byte. Please submit your questions about the portal and I will try to get answers from online knowledge stores.

Hi, Saya Admin Chatbot. Saya sedia chat dengan anda secara terus. Bagaimana saya boleh membantu anda?

Click the button below to interact with the CSM chatbot

Proceed