Arafat Aldhaqm
Arafat Aldhaqm
Senior Lecturer, University Technology Malaysia, Faculty of Engineering, School of Computing
Verified email at utm.my - Homepage
Title
Cited by
Cited by
Year
A metamodel for mobile forensics investigation domain
A Ali, S Abd Razak, SH Othman, A Mohammed, F Saeed
PloS one 12 (4), e0176223, 2017
152017
CDBFIP: Common database forensic investigation processes for internet of things
A Al-Dhaqm, S Razak, SH Othman, KKR Choo, WB Glisson, A Ali, M Abrar
IEEE Access 5, 24401-24416, 2017
132017
Development and validation of a Database Forensic Metamodel (DBFM)
A Al-dhaqm, S Razak, SH Othman, A Ngadi, MN Ahmed, ...
PloS one 12 (2), e0170793, 2017
132017
Towards adapting metamodelling technique for database forensics investigation domain
AMR Al-Dhaqm, SH Othman, S Abd Razak, A Ngadi
2014 International Symposium on Biometrics and Security Technologies (ISBAST …, 2014
112014
A generic database forensic investigation process model
A Al-Dhaqm, S Abd Razak, SH Othman, A Nagdi, A Ali
Jurnal Teknologi 78 (6-11), 2016
102016
Conceptual investigation process model for managing database forensic investigation knowledge
A Aldhaqm, S Abd Razak, SH Othman, A Ali, A Ngadi
Research Journal of Applied Sciences, Engineering and Technology 12 (4), 386-394, 2016
82016
Detection and prevention of malicious activities on RDBMS relational database management systems
M Ngadi, R Al-Dhaqm, A Mohammed
International Journal of Scientific and Engineering Research 3 (9), 1-10, 2012
82012
Towards adapting metamodeling approach for the mobile forensics investigation domain
A Ali, SA Razak, SH Othman, A Mohammed
International Conference on Innovation in Science and Technology (lICIST), 5, 2015
72015
Extraction of common concepts for the mobile forensics domain
A Ali, S Abd Razak, SH Othman, A Mohammed
International Conference of Reliable Information and Communication …, 2017
62017
Categorization and organization of database forensic investigation processes
A Al-Dhaqm, S Abd Razak, DA Dampier, KKR Choo, K Siddique, ...
IEEE Access 8, 112846-112858, 2020
52020
Model derivation system to manage database forensic investigation domain knowledge
A Al-Dhaqm, S Razak, SH Othman
2018 IEEE Conference on Application, Information and Network Security (AINS …, 2018
32018
Data Anonymization Using Pseudonym System to Preserve Data Privacy
S Abd Razak, NHM Nazari, A Al-Dhaqm
IEEE Access 8, 43256-43264, 2020
22020
Detecting Threats in Network Security by Analyzing Network Packets using Wireshark
SAR Abdulalem Ali , Arafat Al - Dhaqm
international Conference of Recent Trends in Information and Communication …, 2014
22014
Optimized backoff scheme for prioritized data in wireless sensor networks: A class of service approach
IU Onwuegbuzie, S Abd Razak, I Fauzi Isnin, TSJ Darwish, A Al-Dhaqm
PloS one 15 (8), e0237154, 2020
12020
Towards the Development of an Integrated Incident Response Model for Database Forensic Investigation Field
A Al-Dhaqm, S Abd Razak, K Siddique, RA Ikuesan, VR Kebande
IEEE Access 8, 145018-145032, 2020
12020
Database Forensic Investigation Process Models: A Review
A Al-Dhaqm, S Abd Razak, SH Othman, A Ali, FA Ghaleb, AS Rosman, ...
IEEE Access 8, 48477-48490, 2020
12020
Common Investigation Process Model for Database Forensic Investiga-tion Discipline
A Aldhaqm, S Abd Razak, SH Othman
1
Erratum to “Quantifying the need for supervised machine learning in conducting live forensics analysis of emergent configurations (ECO) in IoT environments”[Forensic Sci. Int …
VR Kebande, RA Ikuesan, NM Karie, S Alawadi, KKR Choo, A Al-Dhaqm
Forensic Science International: Reports 2, 100135, 2020
2020
A Review of Mobile Forensic Investigation Process Models
A Al-Dhaqm, S Abd Razak, RA Ikuesan, VR Kebande, K Siddique
IEEE Access 8, 173359-173375, 2020
2020
Quantifying the need for Supervised Machine Learning in Conducting Live Forensic Analysis of Emergent Configurations (ECO) in IoT Environments
A 20. Kebande, Victor R. Ikuesan, Richard Adeyemi Karie, Nickson M. Alawadi ...
Forensic Science International: Reports, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20