Gowher Parry | Graphic Era University (original) (raw)

Gowher  Parry

Related Authors

Ruby B. Lee

Jordi Vallverdú

David Kalhous

Remo Caponi

Anne Justice

Ibrahim Cahit

Rossitza Goleva

Bogdan Gabrys

Saira Amir

Saira Amir

COMSATS Institute of Information Technology

PALIMOTE JUSTICE

Uploads

Papers by Gowher Parry

Research paper thumbnail of Open Source Software: The Open Aid for Bioinformatics

The main aim of this paper is to provide basic introduction to bioinformatics and open source sof... more The main aim of
this paper is to provide basic introduction to bioinformatics and open source software and to
throw light on the various open source tools that can be used by researchers and scientists in
the field of bioinformatics. In this paper, the authors try to answer a very crucial question about
emergence of open source software in bioinformatics and also suggest a few preliminary steps
to be taken to ensure this emergence.

Research paper thumbnail of Forensic Analysis of Windows Server 2008 Physical Memory

This paper explores a method based on search of sensitive information from different windows syst... more This paper explores a method based on
search of sensitive information from different windows
system states such as sleep state, logoff state, soft and hard
reboot, for forensic analysis of Windows Server 2008
physical memory. The experiments were carried out in a
virtual environment consisting of Windows Server 2008
operating system.

Research paper thumbnail of Genetic Algorithms in Intrusion Detection Systems: A Survey

The paper provides an introduction to the basic concepts of intrusion detection and genetic algor... more The paper provides an
introduction to the basic concepts of intrusion detection and genetic algorithms. The generic implementation of genetic
algorithms using pseudo code is presented. Pseudo code for genetic algorithm based intrusion detection method is also
included for clear understanding. The paper also provides an overview of the advantages and disadvantages of genetic
algorithms in general, and as applied to intrusion detection in particular. This survey will provide helpful insight into the
related literature and implementation of genetic algorithms in intrusion detection systems. It will also be a good source of
information for people interested in the genetic algorithms based intrusion detection systems.

Research paper thumbnail of Open Source Software: The Open Aid for Bioinformatics

The main aim of this paper is to provide basic introduction to bioinformatics and open source sof... more The main aim of
this paper is to provide basic introduction to bioinformatics and open source software and to
throw light on the various open source tools that can be used by researchers and scientists in
the field of bioinformatics. In this paper, the authors try to answer a very crucial question about
emergence of open source software in bioinformatics and also suggest a few preliminary steps
to be taken to ensure this emergence.

Research paper thumbnail of Forensic Analysis of Windows Server 2008 Physical Memory

This paper explores a method based on search of sensitive information from different windows syst... more This paper explores a method based on
search of sensitive information from different windows
system states such as sleep state, logoff state, soft and hard
reboot, for forensic analysis of Windows Server 2008
physical memory. The experiments were carried out in a
virtual environment consisting of Windows Server 2008
operating system.

Research paper thumbnail of Genetic Algorithms in Intrusion Detection Systems: A Survey

The paper provides an introduction to the basic concepts of intrusion detection and genetic algor... more The paper provides an
introduction to the basic concepts of intrusion detection and genetic algorithms. The generic implementation of genetic
algorithms using pseudo code is presented. Pseudo code for genetic algorithm based intrusion detection method is also
included for clear understanding. The paper also provides an overview of the advantages and disadvantages of genetic
algorithms in general, and as applied to intrusion detection in particular. This survey will provide helpful insight into the
related literature and implementation of genetic algorithms in intrusion detection systems. It will also be a good source of
information for people interested in the genetic algorithms based intrusion detection systems.

Log In