Author of the publication

How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations.

, , and . HICSS, page 1-10. ScholarSpace, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Introduction to the Minitrack on Cyber Operations, Defense, and Forensics., , and . HICSS, page 6601-6602. ScholarSpace, (2023)Cyber Pirates Ahoy! An Analysis of Cybersecurity Challenges in the Shipping Industry., and . CoRR, (2022)Panel: Online Learning, The Educators Experiences., , , , , and . SIGITE, page 99-100. ACM, (2019)A Dynamically-Concise Roadmap Framework for Guiding Connected and Automated Vehicles., , , and . IM, page 1009-1017. IEEE, (2021)Cyber Autopsies: The Integration of Digital Forensics into Medical Contexts., and . CBMS, page 510-513. IEEE, (2020)Introduction to Security and Privacy Challenges for Healthcare Minitrack., and . HICSS, page 1-2. ScholarSpace / AIS Electronic Library (AISeL), (2017)A Bleeding Digital Heart: Identifying Residual Data Generation from Smartphone Applications Interacting with Medical Devices., , and . HICSS, page 1-10. ScholarSpace, (2019)Introduction to the Minitrack on Security and Privacy Challenges for Healthcare., and . HICSS, page 1-2. ScholarSpace / AIS Electronic Library (AISeL), (2018)Knock! Knock! Who Is There? Investigating Data Leakage from a Medical Internet of Things Hijacking Attack., , , and . HICSS, page 1-10. ScholarSpace, (2020)Towards a Cybersecurity Testbed for Agricultural Vehicles and Environments., , , and . CoRR, (2022)