Author of the publication

Analysis of Internet Download Manager for collection of digital forensic artefacts.

, , and . Digital Investigation, 7 (1-2): 90-94 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Improving the Security of Logic Locking., , , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 35 (9): 1411-1424 (2016)Special Session: Countering IP Security threats in Supply chain., , , , , and . VTS, page 1-9. IEEE, (2019)DigLA - A Digsby log analysis tool to identify forensic artifacts., and . Digital Investigation, 9 (3-4): 222-234 (2013)Provably-Secure Logic Locking: From Theory To Practice., , , , , and . ACM Conference on Computer and Communications Security, page 1601-1618. ACM, (2017)TTLock: Tenacious and traceless logic locking., , , and . HOST, page 166. IEEE Computer Society, (2017)Forensic Analysis of Digsby Log Data to Trace Suspected User Activities., , and . ITCS, volume 180 of Lecture Notes in Electrical Engineering, page 119-126. Springer, (2012)On-line laboratories for image and two-dimensional signal processing using 2D J-DSP., , and . ICASSP (3), page 785-788. IEEE, (2003)Analysis of Download Accelerator Plus (DAP) for Forensic Artefacts., , and . IMF, page 142-152. IEEE Computer Society, (2009)ScanSAT: Unlocking Static and Dynamic Scan Obfuscation., , , , , , and . CoRR, (2019)Towards Provably Secure Logic Locking for Hardening Hardware Security Dissertation Summary: IEEE TTTC E.J. McCluskey Doctoral Thesis Award Competition., and . ITC, page 1-10. IEEE, (2018)