Author of the publication

Fast User Classifying to Establish Forensic Analysis Priorities.

, , , and . IMF, page 69-77. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Lentini, Alessandro
add a person with the name Lentini, Alessandro
 

Other publications of authors with the same name

SecureMyDroid: enforcing security in the mobile devices lifecycle., , , and . CSIIRW, page 27. ACM, (2010)A Model for the Dynamics of Bidders in the Simulation of Keyword Auctions., , , , and . UKSim, page 440-445. IEEE Computer Society, (2011)2D Color Barcodes for Mobile Phones., , , and . IJCSA, 8 (1): 136-155 (2011)The Competitor Busting Strategy in Keyword Auctions: Who's Worst Hit?, , , , and . CNSR, page 153-160. IEEE Computer Society, (2011)Fast smartphones forensic analysis results through mobile internal acquisition tool and forensic farm., , , , , and . IJESDF, 2 (1): 18-28 (2009)Trusted SMS - A Novel Framework for Non-repudiable SMS-based Processes., , , and . HEALTHINF (1), page 43-50. INSTICC - Institute for Systems and Technologies of Information, Control and Communication, (2008)Penalized Second Price: A New Pricing Algorithm for Advertising in Search Engines., , , and . CNSR, page 207-214. IEEE Computer Society, (2010)Fast User Classifying to Establish Forensic Analysis Priorities., , , and . IMF, page 69-77. IEEE Computer Society, (2009)Transaction Oriented Text Messaging with Trusted-SMS., , , and . ACSAC, page 485-494. IEEE Computer Society, (2008)SAVED: Secure Android Value addED services., , , , and . MobiCASE, volume 76 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 415-427. Springer, (2010)