Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quality Assurance in a Student-Based Agile Software Engineering Process., , and . Australian Software Engineering Conference, page 324-331. IEEE Computer Society, (2005)A Model for Computer Profiling., , , and . ARES, page 635-640. IEEE Computer Society, (2010)A Comparison of Forensic Acquisition Techniques for Android Devices: A Case Study Investigation of Orweb Browsing Sessions., and . NTMS, page 1-4. IEEE, (2014)Forensic artifacts of Facebook's instant messaging service., , , and . ICITST, page 771-776. IEEE, (2011)Amazon Kindle Fire HD Forensics., , , and . ICDF2C, volume 132 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 39-50. Springer, (2013)A cyber forensics needs analysis survey: Revisiting the domain's needs a decade later., , , and . Computers & Security, (2016)Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes., , , , and . Digital Investigation, 28 (Supplement): 70-82 (2019)Wordnet-Based Criminal Networks Mining for Cybercrime Investigation., , , , and . IEEE Access, (2019)CAT Record (computer activity timeline record): A unified agent based approach for real time computer forensic evidence collection., , , and . SADFE, page 1-8. IEEE, (2013)Forensic artifacts of the ChatON Instant Messaging application., , and . SADFE, page 1-6. IEEE, (2013)