Author of the publication

Behavioural Evidence Analysis Applied to Digital Forensics: An Empirical Analysis of Child Pornography Cases Using P2P Networks.

, , , and . ARES, page 293-302. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quality Assurance in a Student-Based Agile Software Engineering Process., , and . Australian Software Engineering Conference, page 324-331. IEEE Computer Society, (2005)A Model for Computer Profiling., , , and . ARES, page 635-640. IEEE Computer Society, (2010)Forensic artifacts of Facebook's instant messaging service., , , and . ICITST, page 771-776. IEEE, (2011)A Comparison of Forensic Acquisition Techniques for Android Devices: A Case Study Investigation of Orweb Browsing Sessions., and . NTMS, page 1-4. IEEE, (2014)Amazon Kindle Fire HD Forensics., , , and . ICDF2C, volume 132 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 39-50. Springer, (2013)CAT Record (computer activity timeline record): A unified agent based approach for real time computer forensic evidence collection., , , and . SADFE, page 1-8. IEEE, (2013)Forensic artifacts of the ChatON Instant Messaging application., , and . SADFE, page 1-6. IEEE, (2013)A cyber forensics needs analysis survey: Revisiting the domain's needs a decade later., , , and . Computers & Security, (2016)Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes., , , , and . Digital Investigation, 28 (Supplement): 70-82 (2019)Wordnet-Based Criminal Networks Mining for Cybercrime Investigation., , , , and . IEEE Access, (2019)