Loading…
Keynote Speakers: Digital Forensics in IoT Environment
Luthfi, Ahmad
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Get full text
Conference Proceeding
Loading…
Data Leakage Detection in Cloud Computing Environment
Bin Suhaimi, Hurin Haziq, Zubair, H.T.
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Get full text
Conference Proceeding
Loading…
An Analysis of Image Splicing Detection based on Sensor Noise Levels using Principal Component Analysis (PCA) Estimation against ISO Variation Settings
Mohamad Rodzi, Nur Syazwani, Abd Warif, Nor Bakiah, Ismail, Nor-Syahidatul N
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Get full text
Conference Proceeding
Loading…
A Lightweight Biometric-based User Authentication Protocol for Self-driving Vehicles
Coulibaly, Lasseni, Hanyurwimfura, Damien, Twahirwa, Evariste, Diwani, Abubakar
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Get full text
Conference Proceeding
Loading…
Loading…
An Improved Secured Hash Algorithm(SHA1) Using Padding Index Method
De Guzman, Larry B, Salvador, Christian Ian P.
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Get full text
Conference Proceeding
Loading…
Building Digital Trust
Ahmad, Rabiah Bt
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Get full text
Conference Proceeding
Loading…
Algebraic Attack on LCB and Improved LCB
Sucipta, I Ketut Yudi, Susanti, Bety Hayat, Siswantyo, Sepha
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Get full text
Conference Proceeding
Loading…
Loading…
Forensic Evaluation of Gutmann and DoD Secure Data Deletion Algorithms
Harolanuar, Nurul Azura, Ab Rahman, Nurul Hidayah
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Get full text
Conference Proceeding
Loading…
Intrusion Detection System for Cyber-attacks in the Internet of Vehicles (IoV) Environment
Hanifa, Mueez, Zubair, H.T.
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Get full text
Conference Proceeding
Loading…
Accuracy and Execution Time Trade-off Analysis of VGG 16, ResNet-50, and YOLOv8 CNN Models for Face and Eye Detection
Ibrahim, Dahiru Abdulmuhsin, Ahmad Khalid, Shamsul Kamal, Fadzil, Lokman Mohd
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Get full text
Conference Proceeding
Loading…
Loading…
Cryptography in Industry Perspectives
Ngo, Long
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Get full text
Conference Proceeding
Loading…
Sherpasec: A Case Study on the Effectiveness of Cybersecurity Training by a Volunteer-Led Community-Based Professional Society in Malaysia
Khoo, LiJing, Chin, Ji-Jian
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Get full text
Conference Proceeding
Loading…
Feature-Driven DDoS Detection in IoT with Machine Learning Approach
Jayasuri, Sandra Suriya AL, Ramli, Sofia Najwa, Foozy, Cik Feresa Mohd, Yusof, Mohd Azahari Mohd, Mahmoud, Aminu Abdulkadir
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Get full text
Conference Proceeding
Loading…
An Analysis of Copy-Move Forgery Detection based on Discrete Cosine Transform against JPEG Compression and Brightness Changes Attack
Hamidon, Nurul Rihhadatul'aisy, Md Salleh, Siti Fadzlun, Abd Warif, Nor Bakiah
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Get full text
Conference Proceeding
Loading…
Keynote Speakers: Challenges in Malware Analysis
Ab Razak, Mohd Faizal
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Get full text
Conference Proceeding
Loading…
Deepfake Image Detection Using ResNet50 Model
Yee, Lew Kar, Hamid, Isredza Rahmi A, ChaiWen, Chuah, Abdullah, Zubaile, Kipli, Kuryati, Foozy, Cik Feresa Mohd
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Published in 2024 1st International Conference on Cyber Security and Computing (CyberComp) (06.11.2024)
Get full text
Conference Proceeding
Loading…