Proposed computer forensic approach for cloud computing environment

The security perimeter in computing has changed from a fixed boundary to an elastic boundary that is constantly changing and also the threats are evolving, making the Incident handler more difficult to analyze the information system based attacks. Therefore, the purposes of this study are introducin...

Full description

Bibliographic Details
Main Authors: Ahmed, M., Samy, G. N., Maarop, N., Shanmugam, B., Magalingam, P., Ahmad, R.
Format: Article
Published: American Scientific Publishers 2016
Subjects: