Journal & Conference Proceeding Publications

Get latest Journal & Conference Proceeding Publications related to Cybersecurity Malaysia here

 
Share this page :
CSC 0007
Understanding Cyber Terrorism: The Grounded Theory Method Applied
Rabiah Ahmad; Zahri Yunos; Shahrin Sahib
Grounded theory method is gaining importance as a method for theory building about a particular phenomenon. One of the most important benefits is the ability to derive theory from and within the context of data collected. In this research, the authors analyzed the data by using a grounded theory method, in which the cyber terrorism framework is drawn. This paper proposes a conceptual framework describing the components of cyber terrorism from six perspectives: Target, motivation, tools of attack, domain, method of action, and impact. The framework provides a baseline when establishing and defining the concept of cyber terrorism. The finding of this work contributes as strategic input to the policy and decision makers in formulating and developing better policy and strategy to counter cyber terrorism.
Year published : 2012 | 323-328 | IEEE Conference Proceeding
Publication : 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)
CSC 0049
Utilizing Past Experiences of Incident Handlers For Realizing A CBR Recommender in IT Security Incident Response
Wira Zanoramy A. Zakaria, Kilausuria Abdullah & Faiszatulnasro Mohd Maksom
Incident response is a very important subject in IT security. Due to significant rise in the number of total reported incidents, there is a need for an intelligent based recommender system to assist the Incident Handlers (IH) in responding to cyber threats. This work explores the application of the Case-based Reasoning (CBR) methodology in order to develop a CBR recommender system for assisting IH in handling and responding to cyber security incidents. The architecture of the proposed system and the work done on case representation describing some sample cyber incident category are discussed in this paper.
Year published : October 2015
Publication : Proceeding of the 3rd International Conference on Artificial Intelligence and Computer Science 12 – 13 October 2015 in Penang
CSC 0038
Validation of Digital Forensics Tools for Android Tablet
Razana Md Salleh; Masnizah Mohd [UKM]; and Kamarul Baharin Khalid
With the continued growth of the Android mobile device market, the possibility of their use in unlawful and unethical activities will only continue to increase. While vendors and developers of a variety digital forensics tools, both commercial and open-source ones, make various assertions about the capabilities and the performance of their tools, the evaluation of digital forensics tools has been recognized as a challenging, and insufficiently examined research topic in the field of digital forensics. This paper discusses the experiment conducted to acquire data on an Android tablet using four popular digital forensics tools, namely EnCase, Mobile Phone Examiner Plus, Oxygen Forensic Suite and MOBILedit Forensic. The results of the experiment provide an understanding of the capabilities and limitations of each tool and offer an inside view for investigators to choose the appropriate digital forensics tools for acquiring internal data from an Android device.
Year published : 2014 | 019-026 | Volume 9 Issue 1
Publication : Journal of Information Assurance and Security
logo
CyberSecurity Malaysia is the national cyber security specialist agency under the purview of the Ministry of Digital (KD)
 
Contact Us

  • CyberSecurity Malaysia,
    Level 7 Tower 1, Menara Cyber Axis, Jalan Impact,
    63000 Cyberjaya, Selangor Darul Ehsan, Malaysia.

  • enquiry@cybersecurity.my

  • +603 - 8800 7999

  • +603 - 8008 7000

TOP
ASK Byte
Chatbot Portal

Hi, I am ASK Byte. Please submit your questions about the portal and I will try to get answers from online knowledge stores.

Hi, Saya Admin Chatbot. Saya sedia chat dengan anda secara terus. Bagaimana saya boleh membantu anda?

Click the button below to interact with the CSM chatbot

Proceed