BibTeX records: Nurul Hidayah Ab Rahman

download as .bib file

@article{DBLP:journals/ijesdf/HuiMR22,
  author       = {Tay Xin Hui and
                  Kamaruddin Malik Mohamad and
                  Nurul Hidayah Ab Rahman},
  title        = {myEntropy: a file type identification tool using entropy scoring},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {14},
  number       = {1},
  pages        = {76--95},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJESDF.2022.120008},
  doi          = {10.1504/IJESDF.2022.120008},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijesdf/HuiMR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scdm/KamaludinJRSI20,
  author       = {Hazalila Kamaludin and
                  Muhamad Yusmaleef Jamal and
                  Nurul Hidayah Ab Rahman and
                  Noor Zuraidin Mohd Safar and
                  Suhaimi Abd Ishak},
  editor       = {Rozaida Ghazali and
                  Nazri Mohd Nawi and
                  Mustafa Mat Deris and
                  Jemal H. Abawajy},
  title        = {Implementing Virtual Machine: {A} Performance Evaluation},
  booktitle    = {Recent Advances on Soft Computing and Data Mining - Proceedings of
                  the Fourth International Conference on Soft Computing and Data Mining
                  {(SCDM} 2020), Melaka, Malaysia, January 22-23, 2020},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {978},
  pages        = {373--381},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-36056-6\_35},
  doi          = {10.1007/978-3-030-36056-6\_35},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scdm/KamaludinJRSI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/RahmanCC17,
  author       = {Nurul Hidayah Ab Rahman and
                  Niken Dwi Wahyu Cahyani and
                  Kim{-}Kwang Raymond Choo},
  title        = {Cloud incident handling and forensic-by-design: cloud storage as a
                  case study},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {29},
  number       = {14},
  year         = {2017},
  url          = {https://doi.org/10.1002/cpe.3868},
  doi          = {10.1002/CPE.3868},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/RahmanCC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/CahyaniRGC17,
  author       = {Niken Dwi Wahyu Cahyani and
                  Nurul Hidayah Ab Rahman and
                  William Bradley Glisson and
                  Kim{-}Kwang Raymond Choo},
  title        = {The Role of Mobile Forensics in Terrorism Investigations Involving
                  the Use of Cloud Storage Service and Communication Apps},
  journal      = {Mob. Networks Appl.},
  volume       = {22},
  number       = {2},
  pages        = {240--254},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11036-016-0791-8},
  doi          = {10.1007/S11036-016-0791-8},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/monet/CahyaniRGC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/el/17/RahmanKC17,
  author       = {Nurul Hidayah Ab Rahman and
                  Gary C. Kessler and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Kim{-}Kwang Raymond Choo and
                  Ali Dehghantanha},
  title        = {Implications of Emerging Technologies to Incident Handling and Digital
                  Forensic Strategies: {A} Routine Activity Theory},
  booktitle    = {Contemporary Digital Forensic Investigations of Cloud and Mobile Applications},
  pages        = {131--146},
  publisher    = {Elsevier},
  year         = {2017},
  url          = {https://doi.org/10.1016/b978-0-12-805303-4.00009-5},
  doi          = {10.1016/B978-0-12-805303-4.00009-5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/el/17/RahmanKC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cloudcomp/RahmanGYC16,
  author       = {Nurul Hidayah Ab Rahman and
                  William Bradley Glisson and
                  Yanjiang Yang and
                  Kim{-}Kwang Raymond Choo},
  title        = {Forensic-by-Design Framework for Cyber-Physical Cloud Systems},
  journal      = {{IEEE} Cloud Comput.},
  volume       = {3},
  number       = {1},
  pages        = {50--59},
  year         = {2016},
  url          = {https://doi.org/10.1109/MCC.2016.5},
  doi          = {10.1109/MCC.2016.5},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cloudcomp/RahmanGYC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobimedia/CahyaniR0GC16,
  author       = {Niken Dwi Wahyu Cahyani and
                  Nurul Hidayah Ab Rahman and
                  Zheng Xu and
                  William Bradley Glisson and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Zheng Yan and
                  Honggang Wang},
  title        = {The role of mobile forensics in terrorism investigations involving
                  the use of cloud apps},
  booktitle    = {Proceedings of the 9th {EAI} International Conference on Mobile Multimedia
                  Communications, MobiMedia 2016, Xi'an, China, June 18-20, 2016},
  pages        = {199--204},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=3021421},
  timestamp    = {Thu, 19 Oct 2017 12:55:22 +0200},
  biburl       = {https://dblp.org/rec/conf/mobimedia/CahyaniR0GC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RahmanC15,
  author       = {Nurul Hidayah Ab Rahman and
                  Kim{-}Kwang Raymond Choo},
  title        = {A survey of information security incident handling in the cloud},
  journal      = {Comput. Secur.},
  volume       = {49},
  pages        = {45--69},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2014.11.006},
  doi          = {10.1016/J.COSE.2014.11.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RahmanC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/RahmanC15,
  author       = {Nurul Hidayah Ab Rahman and
                  Kim{-}Kwang Raymond Choo},
  title        = {Factors Influencing the Adoption of Cloud Incident Handling Strategy:
                  {A} Preliminary Study in Malaysia},
  booktitle    = {21st Americas Conference on Information Systems, {AMCIS} 2015, Puerto
                  Rico, August 13-15, 2015},
  publisher    = {Association for Information Systems},
  year         = {2015},
  url          = {http://aisel.aisnet.org/amcis2015/ISSecurity/GeneralPresentations/17},
  timestamp    = {Sun, 13 Dec 2015 13:10:52 +0100},
  biburl       = {https://dblp.org/rec/conf/amcis/RahmanC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/el/15/RahmanC15,
  author       = {Nurul Hidayah Ab Rahman and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Ryan Kok Leong Ko and
                  Kim{-}Kwang Raymond Choo},
  title        = {Integrating digital forensic practices in cloud incident handling:
                  {A} conceptual Cloud Incident Handling Model},
  booktitle    = {The Cloud Security Ecosystem - Technical, Legal, Business and Management
                  Issues},
  pages        = {383--400},
  publisher    = {Elsevier},
  year         = {2015},
  url          = {https://doi.org/10.1016/B978-0-12-801595-7.00017-3},
  doi          = {10.1016/B978-0-12-801595-7.00017-3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/el/15/RahmanC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RahmanC15a,
  author       = {Nurul Hidayah Ab Rahman and
                  Kim{-}Kwang Raymond Choo},
  title        = {Factors Influencing the Adoption of Cloud Incident Handling Strategy:
                  {A} Preliminary Study in Malaysia},
  journal      = {CoRR},
  volume       = {abs/1505.02908},
  year         = {2015},
  url          = {http://arxiv.org/abs/1505.02908},
  eprinttype    = {arXiv},
  eprint       = {1505.02908},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RahmanC15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics