Pritheega Magalingam
Universiti Teknologi Malaysia
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Pritheega Magalingam.
information assurance and security | 2009
Mazdak Zamani; Azizah Abdul Manaf; Rabiah Ahmad; Akram M. Zeki; Pritheega Magalingam
This paper presents a novel, principled approach to resolve the remained problems of substitution technique of audio watermarking. Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well.
Archive | 2019
Suriayati Chuprat; Aswami Fadillah Mohd Ariffin; Shamsul Sahibuddin; Mohd Naz’ri Mahrin; Firham M. Senan; Noor Azurati Ahmad; Ganthan Narayana; Pritheega Magalingam; Syahid Anuar; Mohd Zabri Talib
The dramatically increased threats such as malware attacks to our cyber world have given us the vital sign to strengthen the security in a more proactive way. Thus, in recent research we proposed an integrated malware forensic analytics framework that will expose the future threats of malware attacks. This framework incorporates malware collections, malware analytics and visualization of discovered malware attacks. In this paper, we present the design and implementation of the framework which focuses on analytics and visualization, and utilized the emerging technology of big data platform. The implementation of the framework shows promising results in presenting descriptive analytics and predicting the future attacks using machine learning algorithms. We also demonstrate the feasibility of Hortonworks Cybersecurity Package (HCP) in supporting the proposed framework. Finally, we discussed the future work that can be further investigated in improving the implementation of the framework.
Archive | 2018
Ganthan Narayana Samy; Sameer Hasan Albakri; Nurazean Maarop; Pritheega Magalingam; Doris Hooi-Ten Wong; Bharanidharan Shanmugam; Sundresan Perumal
Cloud computing model brought many technical and economic benefits, however, there are many security issues. Most of the common traditional information security risk assessment methods such as ISO27005, NIST SP800-30 and AS/NZS 4360 are not fit for the cloud computing environment. Therefore, this study applies medical research approach to assess the information security threats in the cloud computing environment. This study has been conducted as a retrospective cohort study and the collected data has been analyzed by using the survival analysis method. The study has been conducted on the software as a service (SaaS) environment that has more than one thousand and seven hundred cloud customers. The survival analysis method is used to measure the significance of the risk factor level. The information security threats have been categorized into twenty-two categories. This study has proven that the medical research approach can be used to assess the security risk assessment in cloud computing environment to overcome the weaknesses that accompany the usage of the traditional information security risk assessment methods in cloud computing environment.
International Conference of Reliable Information and Communication Technology | 2017
Ganthan Narayana Samy; Bharanidharan Shanmugam; Nurazean Maarop; Pritheega Magalingam; Sundresan Perumal; Sameer Hasan Albakri
The cloud computing model has been developed with promises to overcome the difficulties of other computing models. The low cost of computing resources, availability, location independence, and more focus on business objectives that this model promises are the most attractive features for companies. However, security issues are still the main obstacle that prevent widespread cloud computing adaptation. Digital forensics, a necessary process after any security incident, is faced with many challenges in the cloud computing environment. In this paper, we discuss the challenges digital forensics face in a cloud computing environment.
Bulletin of The Australian Mathematical Society | 2016
Pritheega Magalingam
Retrieving criminal ties and mining evidence from an organised crime incident, for example money laundering, has been a difficult task for crime investigators due to the involvement of different groups of people and their complex relationships. Extracting
international conference on digital forensics | 2009
Pritheega Magalingam; Azizah Abdul Manaf; Rabiah Ahmad; Zuraimi Yahya
Hardware forensic analysis involves the process of analyzing digital evidence derived from digital sources. The analysis is done to facilitate and prove either the device is used to commit crime, whether it contains evidence of a crime or is the target of a crime. Gambling machines serve as the main source by which illegal games are conducted. This paper presents a method for retrieving information from a seized gaming machine, along with an analysis of the interpreted information to prove that the gaming machine was used illegally. The proposed procedures for the gambling machine forensic process will be important for forensic investigators (e.g., the police or private investigators), as they will assist these individuals in the digital forensic evidence analysis necessary to produce evidence relevant to illegal gambling.
Digital Investigation | 2015
Pritheega Magalingam; Stephen Davis; Asha Rao
Proceedings of the 7th International Conference on Software and Information Engineering | 2018
Marlina Abdul Latib; Saiful Adli Ismail; Othman Mohd Yusop; Pritheega Magalingam; Azri Azmi
Open International Journal of Informatics | 2018
Doris Hooi-Ten Wong; Chen-Siang Phang; Nurazean Maarop; Ganthan Narayana Samy; Roslina Ibrahim; Rasimah Che Mohd Yusoff; Pritheega Magalingam; Nurulhuda Firdaus Mohd Azmi
Journal of Telecommunication, Electronic and Computer Engineering | 2018
Ganthan Narayana Samy; Pritheega Magalingam; Aswami Fadillah Mohd Ariffin; Wafa Mohd Khairudin; Mohamad Firham Efendy Md Senan; Zahri Yunos