Author of the publication

A Simple Cost-Effective Framework for iPhone Forensic Analysis.

, , and . ICDF2C, volume 53 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 27-37. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results., , , and . Digital Investigation, 10 (1): 34-43 (2013)Testing the forensic soundness of forensic examination environments on bootable media., , , and . Digital Investigation, 11 (S-2): S22-S29 (2014)Research Trends in Digital Forensic Science: An Empirical Analysis of Published Research., , , and . ICDF2C, volume 114 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 144-157. Springer, (2012)Exploring Deviant Hacker Networks (DHN) On Social Media Platforms., , , , and . JDFSL, 11 (2): 7-20 (2016)Computer Profiling for Preliminary Forensic Examination., , and . ICDF2C, volume 132 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 207-220. Springer, (2013)Forensic State Acquisition from Internet of Things (FSAIoT): A general framework and practical approach for IoT forensics through IoT device state acquisition., , , and . ARES, page 56:1-56:11. ACM, (2017)Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory Study., , , and . ICDF2C, volume 114 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 91-108. Springer, (2012)Forensic artifacts of Facebook's instant messaging service., , , and . ICITST, page 771-776. IEEE, (2011)Frameup: An incriminatory attack on Storj: A peer to peer blockchain enabled distributed storage system., , , and . Digital Investigation, (2019)Map My Murder: A Digital Forensic Study of Mobile Health and Fitness Applications., , , and . ARES, page 42:1-42:12. ACM, (2019)