Author of the publication

Paradigm shift in document related frauds: Characteristics identification for development of a non-destructive automated system for printed documents.

, , , and . Digital Investigation, 3 (1): 43-55 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Mazumdar, Chandan
add a person with the name Mazumdar, Chandan
 

Other publications of authors with the same name

Study of a Simulated Stream Machine for Dataflow Computation., , and . Perform. Eval., 6 (4): 269-291 (1986)Intensity-based image matching for regular firearms., , , and . Int. J. Imaging Systems and Technology, 12 (2): 68-72 (2002)Document Frauds: Identification and Linking Fake Document to Scanners and Printers., , , and . ICCTA, page 497-501. IEEE Computer Society, (2007)Performance Comparison of Hadoop Based Tools with Commercial ETL Tools - A Case Study., , and . BDA, volume 8302 of Lecture Notes in Computer Science, page 176-184. Springer, (2013)Network Vulnerability Analysis Using a Constrained Graph Data Model., , and . ICISS, volume 10063 of Lecture Notes in Computer Science, page 263-282. Springer, (2016)A Quantitative Methodology for Business Process-Based Data Privacy Risk Computation., , and . ACSS (2), volume 996 of Advances in Intelligent Systems and Computing, page 17-33. Springer, (2019)A Novel Model of Security Policies and Requirements., and . ICISSP, page 73-82. SciTePress, (2015)A risk-based methodology for privacy requirements elicitation and control selection., , and . Secur. Priv., (2022)Digital Forensic Analysis of E-Mails: A Trusted E-Mail Protocol., , and . IJDE, (2004)Modelling operations and security of cloud systems using Z-notation and Chinese Wall security policy., , and . Enterprise IS, 10 (9): 1024-1046 (2016)