Author of the publication

A Quantitative Approach to Triaging in Mobile Forensics.

, , , and . TrustCom, page 582-588. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Text Clustering for Digital Forensics Analysis., , , , , and . CISIS, volume 63 of Advances in Intelligent and Soft Computing, page 29-36. Springer, (2009)Automatic Verification of Security in Payment Protocols for Electronic Commerce., , , and . ICEIS, page 968-974. (2002)A Case Study on Digital Forensics in the Cloud., , and . CyberC, page 111-116. IEEE Computer Society, (2012)Verification of the SSL/TLS Protocol Using a Model Checkable Logic of Belief and Time., , , and . SAFECOMP, volume 2434 of Lecture Notes in Computer Science, page 126-138. Springer, (2002)An Architecture for Distributed Dictionary Attacks to Cryptosystems., , , and . J. Comput., 4 (5): 378-386 (2009)A Machine Learning-based Triage methodology for automated categorization of digital media., and . Digital Investigation, 10 (2): 193-204 (2013)Verifica formale dei protocolli di sicurezza mediante model checking., , and . SEBD, page 167-180. (2000)Triage-based automated analysis of evidence in court cases of copyright infringement., , , and . ICC, page 6668-6672. IEEE, (2012)Model checking the security of multi-protocol systems., , , and . CTS, page 92-99. IEEE Computer Society, (2005)Verification of Payment Protocols via MultiAgent Model Checking., , , and . CAiSE, volume 2348 of Lecture Notes in Computer Science, page 311-327. Springer, (2002)