Mohammed Farik | University of Fiji (original) (raw)

Papers by Mohammed Farik

Research paper thumbnail of Digital Image Processing Using Noise Removal Technique: A Non-Linear Approach

2022 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)

Research paper thumbnail of Multi-century records of snow water equivalent and streamflow drought from energy-limited tree rings in south coastal British Columbia

Outside Member Anthropogenic climate change has triggered widespread shifts in the global hydrolo... more Outside Member Anthropogenic climate change has triggered widespread shifts in the global hydrological cycle. In south coastal British Columbia, these changes have led to more winter precipitation falling as rain rather than snow, more rain on snow events, and generally reduced snowpacks. Since snowmelt is a primary source of summer surface runoff and groundwater, snowpack declines have caused severe seasonal streamflow droughts in recent decades. For accurate water supply forecasting under future climate change, it is crucial to know if snowpack and runoff declines are unprecedented in the last several hundred years. This research focused on developing multi-century, annually-resolved records of snow water equivalent and streamflow drought to determine if recent conditions deviate from long-term norms. The research targeted small temperate watersheds that are not usually conducive to application of dendrohydrological methodologies. Traditional dendrohydrology relies on moisture-limited tree-ring records from arid settings. This dissertation presents a new method for developing tree-ring based reconstructions from energy-limited trees. Tree-ring records from highelevation mountain hemlock (Tsuga mertensiana (Bong.) Carrière) and amabilis fir (Amabilis (Dougl.) Forbes) stands were collected at sites in south coastal British Columbia. Ring-width measurements were used to develop multi-century dendrohydrological models of snow water equivalent and streamflow drought. A v Table of Contents Multi-century records of snow water equivalent and streamflow drought from energy-limited tree rings in south coastal British Columbia .

Research paper thumbnail of Multimodal Authentication-Biometric, Password, And Steganography

Security is a major concern for everyone, be it individuals or organizations. As the nature of in... more Security is a major concern for everyone, be it individuals or organizations. As the nature of information systems is becoming distributed, securing them is becoming difficult as well. New applications are developed by researchers and developers to counter security issues but as soon as the application is released new attacks are formed to bypass the application. Kerberos is an authentication protocol which helps in to verify and validate a user to a server. As it is a widely used protocol minimizing or preventing the password attack is important. In this research we have analyzed the Kerberos protocol and suggested some ideas which can be considered while updating Kerberos to prevent the password attack. In the proposed solution we are suggesting to use password and biometric technique while registering on the network to enjoy the services and a combination of cryptography and steganography technique while communicating back to the user.

Research paper thumbnail of Bridging Gaps For Better & Smarter Mobile Applications

In recent years, there has been considerable research interest in mobile applications development... more In recent years, there has been considerable research interest in mobile applications development, in particular on ontology and context-awareness. In this review paper, the aim is to understand current challenges in mobile applications development and find gaps to bridge for better and smarter mobile applications in the future. We believe the ideas suggested in opportunities will allow researchers to redesign related hardware and software technologies for greater functionalities and better user experiences, and application developers to make future applications that are more productive in the users' context.

Research paper thumbnail of New Ways To Fight Malware

Network security is vital in each field of today's reality, for example, government workplace... more Network security is vital in each field of today's reality, for example, government workplaces, instructive foundations, any business association and so forth. Information security is now top agenda for any computing environment ensuring safe transmission of information from sender to recipients. Dangers to data privacy are powerful and enhanced devices in the hands of attackers that could utilize the vulnerabilities of a system to degenerate, annihilate steal the sensitive data. This paper discusses latest trends and types of malwares, malware attacks techniques, method of propagation and detection additionally, it exhibits recommendations on various solutions are expressed to combat malware attacks. The primary beneficiaries of this journal are network engineers, network administrators, academics and students whose focus area is network security for research and development.

Research paper thumbnail of Campus Area Network Wi-Fi Security

Wireless connectivity devices such as mobile phones and laptops are being increasingly used by Un... more Wireless connectivity devices such as mobile phones and laptops are being increasingly used by University students to access learning resources on campus networks and the Internet. Each of the mobile devices offers security protocols for connection to a Wi-Fi router. This paper presents an overview of Wi-Fi security and recommendations in relation to free Wi-Fi service at The University of Fiji.

Research paper thumbnail of Parental Engagement Framework and Strategies in Fiji Schools - a Review

International Journal of Advanced Research

Research paper thumbnail of Information Security-Recent Attacks In Fiji

Information technology (IT) plays a vital role in Fiji's economy as businesses strive for com... more Information technology (IT) plays a vital role in Fiji's economy as businesses strive for competitive advantage. However, IT has also become a tool for attackers. Hence, it is important that all IT users invest in better information security technologies and practices to safeguard against all possible attacks and threats that emerge in the horizon. In this paper, we review recent information security attacks that have taken place in Fiji and recommend countermeasures to safeguard against such attacks in the future.

Research paper thumbnail of Static Load Balancing Algorithms in Cloud Computing: Challenges & Solutions

Cloud computing provides on-demand hosted computing resources and services over the Internet on a... more Cloud computing provides on-demand hosted computing resources and services over the Internet on a pay-per-use basis. It is currently becoming the favored method of communication and computation over scalable networks due to numerous attractive attributes such as high availability, scalability, fault tolerance, simplicity of management and low cost of ownership. Due to the huge demand of cloud computing, efficient load balancing becomes critical to ensure that computational tasks are evenly distributed across servers to prevent bottlenecks. The aim of this review paper is to understand the current challenges in cloud computing, primarily in cloud load balancing using static algorithms and finding gaps to bridge for more efficient static cloud load balancing in the future. We believe the ideas suggested as new solution will allow researchers to redesign better algorithms for better functionalities and improved user experiences in simple cloud systems. This could assist small businesse...

Research paper thumbnail of Challenges & Solutions of Adoption in Regards to Phone-Based Remote E-Voting

Remote Voting Systems has not been universally adopted by most countries for their elections such... more Remote Voting Systems has not been universally adopted by most countries for their elections such as in the case of Fiji. Although mobile phones are quite prevalent around the world and the amount of smart phones sold is increasing at a rapid rate, there have not been many elections which have capitalized on the use of Mobile Phones as a remote voting tool. This paper is a limited review of previous papers on remote voting systems. The aim was to study challenges of adoption of remote e-voting systems such as through a mobile phone and suggest innovative solutions to those challenges. As such we propose a combination of new policy solutions and technical solutions such as the use of QR code and checksum for vote verification, the use of real time facial recognition systems, and the leveraging of existing mobile hardware to ensure a secure, anonymous and trustworthy remote voting system like it has never been before.

Research paper thumbnail of A Novel Recommendation To AES Limitation

Among all available conventional encryption algorithms, the AES (Advanced Encryption Standard) is... more Among all available conventional encryption algorithms, the AES (Advanced Encryption Standard) is the most secured and highly used algorithm. AES algorithm is widely used by variety of applications like Archive and Compression tools, File Encryption, Encryption File System, Disk / Partition Encryption, Networking, Signal Protocol, among others. This paper highlights the Brute Force attack and Cryptanalysis attack on AES Algorithm. This paper also discusses about a novel recommendation of a combination model of AES Algorithm and Random-X Cipher.

Research paper thumbnail of Ransomware-Threats, Vulnerabilities And Recommendations

Attack methodologies transform with the transforming dynamics of technology. Consequently it beco... more Attack methodologies transform with the transforming dynamics of technology. Consequently it becomes imperative that individuals and organization implement the highest levels of security within their devices and infrastructure for optimal protection against these rapidly evolving attacks. Ransomware is one such attack that never fails to surprise in terms of its ability to identify vulnerabilities and loopholes in technology. This paper discusses the categories of ransomware, its common attack vectors and provides a threat landscape with the aim to highlight the true potential and destructive nature of such malware based attacks. In this paper we also present the most current ransomware attack that is still a potential threat and also provide recommendations and strategies for prevention and protection against these attacks. A novel solution is also discussed that could be further worked upon in the future by other researchers and vendors of security devices.

Research paper thumbnail of Integration of Innovative Technologies and Affective Teaching & Learning in Programming Courses

Technology has been integral component in the teaching and learning process in this millennium. I... more Technology has been integral component in the teaching and learning process in this millennium. In this review paper, we evaluate the different technologies which are used to currently facilitate the teaching and learning of computer programming courses. The aim is to identify problems or gaps in technology usage in the learning environment, and suggest affective solutions for technology integration into programming courses at the University levels in the future. We believe that with the inclusion of suggested innovative technologies and affective solutions in programming courses, teaching and learning will be attractive and best for the programming industry.

Research paper thumbnail of Static Load Balancing Algorithms In Cloud Computing: Challenges & Solutions

Abstract: Cloud computing provides on-demand hosted computing resources and services over the Int... more Abstract: Cloud computing provides on-demand hosted computing resources and services over the Internet on a pay-per-use basis. It is currently becoming the favored method of communication and computation over scalable networks due to numerous attractive attributes such as high availability, scalability, fault tolerance, simplicity of management and low cost of ownership. Due to the huge demand of cloud computing, efficient load balancing becomes critical to ensure that computational tasks are evenly distributed across servers to prevent bottlenecks. The aim of this review paper is to understand the current challenges in cloud computing, primarily in cloud load balancing using static algorithms and finding gaps to bridge for more efficient static cloud load balancing in the future. We believe the ideas suggested as new solution will allow researchers to redesign better algorithms for better functionalities and improved user experiences in simple cloud systems. This could assist small...

Research paper thumbnail of Algorithm to Ensure and Enforce Brute-Force Attack-Resilient Password in Routers

Issues of weak login passwords arising from default passwords in wired and wireless routers has b... more Issues of weak login passwords arising from default passwords in wired and wireless routers has been a concern for more than a decade. In this research we develop and test an algorithm to ensure and enforce passwords in routers that are resistant to brute-force attack. A comparative analysis is performed to show the improved strengths of passwords derived via this algorithm. Implementation of this algorithm in routers will ensure setup of brute-force attack resistant passwords.

Research paper thumbnail of Effectiveness Of Teaching & Learning Mathematics Using Children's Home Language And Cultural Tools

The purpose of this research paper is twofold. First, the aim is to prove the effectiveness of us... more The purpose of this research paper is twofold. First, the aim is to prove the effectiveness of using children's home language and cultural tools in teaching and learning mathematics at primary school level in Fiji. For privacy reasons, the actual name of the participating school is not mentioned in this paper. Secondly, this paper also demonstrates how practicing teachers can use the problem-solving approach and selective analytics to do research in order to improve their own teaching and learning in the classroom. We believe that the new findings and methods demonstrated in this paper will help improve mathematics teaching & learning processes and motivate teachers to collaborate with fellow teachers and do more researches in their classrooms and to publish their works.

Research paper thumbnail of A New Substitution Cipher - Random-X

International Journal of Scientific & Technology Research, 2016

Ciphers are the encryption methods to prepare the algorithm for encryption and decryption. The cu... more Ciphers are the encryption methods to prepare the algorithm for encryption and decryption. The currently known ciphers are not strong enough to protect the data. A new substitution cipher – Random-X, that we introduce in this paper, can be used for password encryption and data encryption. Random-X cipher is a unique substitution cipher which replaces the units of plaintext with triplets of letters. The beauty of this cipher is that the encrypted string of the same plain text is not always same. This makes it strong and difficult to crack. This paper covers the principle, the implementation ideas and testing of Random-X cipher.

Research paper thumbnail of Campus Area Network Wi-Fi Security

International Journal of Scientific & Technology Research, 2017

Wireless connectivity devices such as mobile phones and laptops are being increasingly used by Un... more Wireless connectivity devices such as mobile phones and laptops are being increasingly used by University students to access learning resources on campus networks and the Internet. Each of the mobile devices offers security protocols for connection to a Wi-Fi router. This paper presents an overview of Wi-Fi security and recommendations in relation to free Wi-Fi service at The University of Fiji.

Research paper thumbnail of Cybersecurity Situation In Fiji

International Journal of Scientific & Technology Research, 2016

We buy, work, play and essentially live online. As our lives progressively depend on information ... more We buy, work, play and essentially live online. As our lives progressively depend on information technology services, the necessity to protect our information from being maliciously disrupted is critical. Anything that is networked can be hacked, and with the increasing dependence on the Internet everything is being networked, therefore everything is vulnerable. This paper discusses common computer crimes threats, reflects on challenges & weaknesses of computer crime & cybercrime laws in Fiji, and provides novel recommendations for the way forward in fight against cybercrime.

Research paper thumbnail of Cloud Computing Security Latest Issues amp Countermeasures

International Journal of Scientific & Technology Research, 2015

Research paper thumbnail of Digital Image Processing Using Noise Removal Technique: A Non-Linear Approach

2022 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)

Research paper thumbnail of Multi-century records of snow water equivalent and streamflow drought from energy-limited tree rings in south coastal British Columbia

Outside Member Anthropogenic climate change has triggered widespread shifts in the global hydrolo... more Outside Member Anthropogenic climate change has triggered widespread shifts in the global hydrological cycle. In south coastal British Columbia, these changes have led to more winter precipitation falling as rain rather than snow, more rain on snow events, and generally reduced snowpacks. Since snowmelt is a primary source of summer surface runoff and groundwater, snowpack declines have caused severe seasonal streamflow droughts in recent decades. For accurate water supply forecasting under future climate change, it is crucial to know if snowpack and runoff declines are unprecedented in the last several hundred years. This research focused on developing multi-century, annually-resolved records of snow water equivalent and streamflow drought to determine if recent conditions deviate from long-term norms. The research targeted small temperate watersheds that are not usually conducive to application of dendrohydrological methodologies. Traditional dendrohydrology relies on moisture-limited tree-ring records from arid settings. This dissertation presents a new method for developing tree-ring based reconstructions from energy-limited trees. Tree-ring records from highelevation mountain hemlock (Tsuga mertensiana (Bong.) Carrière) and amabilis fir (Amabilis (Dougl.) Forbes) stands were collected at sites in south coastal British Columbia. Ring-width measurements were used to develop multi-century dendrohydrological models of snow water equivalent and streamflow drought. A v Table of Contents Multi-century records of snow water equivalent and streamflow drought from energy-limited tree rings in south coastal British Columbia .

Research paper thumbnail of Multimodal Authentication-Biometric, Password, And Steganography

Security is a major concern for everyone, be it individuals or organizations. As the nature of in... more Security is a major concern for everyone, be it individuals or organizations. As the nature of information systems is becoming distributed, securing them is becoming difficult as well. New applications are developed by researchers and developers to counter security issues but as soon as the application is released new attacks are formed to bypass the application. Kerberos is an authentication protocol which helps in to verify and validate a user to a server. As it is a widely used protocol minimizing or preventing the password attack is important. In this research we have analyzed the Kerberos protocol and suggested some ideas which can be considered while updating Kerberos to prevent the password attack. In the proposed solution we are suggesting to use password and biometric technique while registering on the network to enjoy the services and a combination of cryptography and steganography technique while communicating back to the user.

Research paper thumbnail of Bridging Gaps For Better & Smarter Mobile Applications

In recent years, there has been considerable research interest in mobile applications development... more In recent years, there has been considerable research interest in mobile applications development, in particular on ontology and context-awareness. In this review paper, the aim is to understand current challenges in mobile applications development and find gaps to bridge for better and smarter mobile applications in the future. We believe the ideas suggested in opportunities will allow researchers to redesign related hardware and software technologies for greater functionalities and better user experiences, and application developers to make future applications that are more productive in the users' context.

Research paper thumbnail of New Ways To Fight Malware

Network security is vital in each field of today's reality, for example, government workplace... more Network security is vital in each field of today's reality, for example, government workplaces, instructive foundations, any business association and so forth. Information security is now top agenda for any computing environment ensuring safe transmission of information from sender to recipients. Dangers to data privacy are powerful and enhanced devices in the hands of attackers that could utilize the vulnerabilities of a system to degenerate, annihilate steal the sensitive data. This paper discusses latest trends and types of malwares, malware attacks techniques, method of propagation and detection additionally, it exhibits recommendations on various solutions are expressed to combat malware attacks. The primary beneficiaries of this journal are network engineers, network administrators, academics and students whose focus area is network security for research and development.

Research paper thumbnail of Campus Area Network Wi-Fi Security

Wireless connectivity devices such as mobile phones and laptops are being increasingly used by Un... more Wireless connectivity devices such as mobile phones and laptops are being increasingly used by University students to access learning resources on campus networks and the Internet. Each of the mobile devices offers security protocols for connection to a Wi-Fi router. This paper presents an overview of Wi-Fi security and recommendations in relation to free Wi-Fi service at The University of Fiji.

Research paper thumbnail of Parental Engagement Framework and Strategies in Fiji Schools - a Review

International Journal of Advanced Research

Research paper thumbnail of Information Security-Recent Attacks In Fiji

Information technology (IT) plays a vital role in Fiji's economy as businesses strive for com... more Information technology (IT) plays a vital role in Fiji's economy as businesses strive for competitive advantage. However, IT has also become a tool for attackers. Hence, it is important that all IT users invest in better information security technologies and practices to safeguard against all possible attacks and threats that emerge in the horizon. In this paper, we review recent information security attacks that have taken place in Fiji and recommend countermeasures to safeguard against such attacks in the future.

Research paper thumbnail of Static Load Balancing Algorithms in Cloud Computing: Challenges & Solutions

Cloud computing provides on-demand hosted computing resources and services over the Internet on a... more Cloud computing provides on-demand hosted computing resources and services over the Internet on a pay-per-use basis. It is currently becoming the favored method of communication and computation over scalable networks due to numerous attractive attributes such as high availability, scalability, fault tolerance, simplicity of management and low cost of ownership. Due to the huge demand of cloud computing, efficient load balancing becomes critical to ensure that computational tasks are evenly distributed across servers to prevent bottlenecks. The aim of this review paper is to understand the current challenges in cloud computing, primarily in cloud load balancing using static algorithms and finding gaps to bridge for more efficient static cloud load balancing in the future. We believe the ideas suggested as new solution will allow researchers to redesign better algorithms for better functionalities and improved user experiences in simple cloud systems. This could assist small businesse...

Research paper thumbnail of Challenges & Solutions of Adoption in Regards to Phone-Based Remote E-Voting

Remote Voting Systems has not been universally adopted by most countries for their elections such... more Remote Voting Systems has not been universally adopted by most countries for their elections such as in the case of Fiji. Although mobile phones are quite prevalent around the world and the amount of smart phones sold is increasing at a rapid rate, there have not been many elections which have capitalized on the use of Mobile Phones as a remote voting tool. This paper is a limited review of previous papers on remote voting systems. The aim was to study challenges of adoption of remote e-voting systems such as through a mobile phone and suggest innovative solutions to those challenges. As such we propose a combination of new policy solutions and technical solutions such as the use of QR code and checksum for vote verification, the use of real time facial recognition systems, and the leveraging of existing mobile hardware to ensure a secure, anonymous and trustworthy remote voting system like it has never been before.

Research paper thumbnail of A Novel Recommendation To AES Limitation

Among all available conventional encryption algorithms, the AES (Advanced Encryption Standard) is... more Among all available conventional encryption algorithms, the AES (Advanced Encryption Standard) is the most secured and highly used algorithm. AES algorithm is widely used by variety of applications like Archive and Compression tools, File Encryption, Encryption File System, Disk / Partition Encryption, Networking, Signal Protocol, among others. This paper highlights the Brute Force attack and Cryptanalysis attack on AES Algorithm. This paper also discusses about a novel recommendation of a combination model of AES Algorithm and Random-X Cipher.

Research paper thumbnail of Ransomware-Threats, Vulnerabilities And Recommendations

Attack methodologies transform with the transforming dynamics of technology. Consequently it beco... more Attack methodologies transform with the transforming dynamics of technology. Consequently it becomes imperative that individuals and organization implement the highest levels of security within their devices and infrastructure for optimal protection against these rapidly evolving attacks. Ransomware is one such attack that never fails to surprise in terms of its ability to identify vulnerabilities and loopholes in technology. This paper discusses the categories of ransomware, its common attack vectors and provides a threat landscape with the aim to highlight the true potential and destructive nature of such malware based attacks. In this paper we also present the most current ransomware attack that is still a potential threat and also provide recommendations and strategies for prevention and protection against these attacks. A novel solution is also discussed that could be further worked upon in the future by other researchers and vendors of security devices.

Research paper thumbnail of Integration of Innovative Technologies and Affective Teaching & Learning in Programming Courses

Technology has been integral component in the teaching and learning process in this millennium. I... more Technology has been integral component in the teaching and learning process in this millennium. In this review paper, we evaluate the different technologies which are used to currently facilitate the teaching and learning of computer programming courses. The aim is to identify problems or gaps in technology usage in the learning environment, and suggest affective solutions for technology integration into programming courses at the University levels in the future. We believe that with the inclusion of suggested innovative technologies and affective solutions in programming courses, teaching and learning will be attractive and best for the programming industry.

Research paper thumbnail of Static Load Balancing Algorithms In Cloud Computing: Challenges & Solutions

Abstract: Cloud computing provides on-demand hosted computing resources and services over the Int... more Abstract: Cloud computing provides on-demand hosted computing resources and services over the Internet on a pay-per-use basis. It is currently becoming the favored method of communication and computation over scalable networks due to numerous attractive attributes such as high availability, scalability, fault tolerance, simplicity of management and low cost of ownership. Due to the huge demand of cloud computing, efficient load balancing becomes critical to ensure that computational tasks are evenly distributed across servers to prevent bottlenecks. The aim of this review paper is to understand the current challenges in cloud computing, primarily in cloud load balancing using static algorithms and finding gaps to bridge for more efficient static cloud load balancing in the future. We believe the ideas suggested as new solution will allow researchers to redesign better algorithms for better functionalities and improved user experiences in simple cloud systems. This could assist small...

Research paper thumbnail of Algorithm to Ensure and Enforce Brute-Force Attack-Resilient Password in Routers

Issues of weak login passwords arising from default passwords in wired and wireless routers has b... more Issues of weak login passwords arising from default passwords in wired and wireless routers has been a concern for more than a decade. In this research we develop and test an algorithm to ensure and enforce passwords in routers that are resistant to brute-force attack. A comparative analysis is performed to show the improved strengths of passwords derived via this algorithm. Implementation of this algorithm in routers will ensure setup of brute-force attack resistant passwords.

Research paper thumbnail of Effectiveness Of Teaching & Learning Mathematics Using Children's Home Language And Cultural Tools

The purpose of this research paper is twofold. First, the aim is to prove the effectiveness of us... more The purpose of this research paper is twofold. First, the aim is to prove the effectiveness of using children's home language and cultural tools in teaching and learning mathematics at primary school level in Fiji. For privacy reasons, the actual name of the participating school is not mentioned in this paper. Secondly, this paper also demonstrates how practicing teachers can use the problem-solving approach and selective analytics to do research in order to improve their own teaching and learning in the classroom. We believe that the new findings and methods demonstrated in this paper will help improve mathematics teaching & learning processes and motivate teachers to collaborate with fellow teachers and do more researches in their classrooms and to publish their works.

Research paper thumbnail of A New Substitution Cipher - Random-X

International Journal of Scientific & Technology Research, 2016

Ciphers are the encryption methods to prepare the algorithm for encryption and decryption. The cu... more Ciphers are the encryption methods to prepare the algorithm for encryption and decryption. The currently known ciphers are not strong enough to protect the data. A new substitution cipher – Random-X, that we introduce in this paper, can be used for password encryption and data encryption. Random-X cipher is a unique substitution cipher which replaces the units of plaintext with triplets of letters. The beauty of this cipher is that the encrypted string of the same plain text is not always same. This makes it strong and difficult to crack. This paper covers the principle, the implementation ideas and testing of Random-X cipher.

Research paper thumbnail of Campus Area Network Wi-Fi Security

International Journal of Scientific & Technology Research, 2017

Wireless connectivity devices such as mobile phones and laptops are being increasingly used by Un... more Wireless connectivity devices such as mobile phones and laptops are being increasingly used by University students to access learning resources on campus networks and the Internet. Each of the mobile devices offers security protocols for connection to a Wi-Fi router. This paper presents an overview of Wi-Fi security and recommendations in relation to free Wi-Fi service at The University of Fiji.

Research paper thumbnail of Cybersecurity Situation In Fiji

International Journal of Scientific & Technology Research, 2016

We buy, work, play and essentially live online. As our lives progressively depend on information ... more We buy, work, play and essentially live online. As our lives progressively depend on information technology services, the necessity to protect our information from being maliciously disrupted is critical. Anything that is networked can be hacked, and with the increasing dependence on the Internet everything is being networked, therefore everything is vulnerable. This paper discusses common computer crimes threats, reflects on challenges & weaknesses of computer crime & cybercrime laws in Fiji, and provides novel recommendations for the way forward in fight against cybercrime.

Research paper thumbnail of Cloud Computing Security Latest Issues amp Countermeasures

International Journal of Scientific & Technology Research, 2015