Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Increasing digital investigator availability through efficient workflow management and automation., , , , and . CoRR, (2017)Battling the Digital Forensic Backlog through Data Deduplication.. CoRR, (2016)Forensic Analysis of Epic Privacy Browser on Windows Operating Systems., , and . CoRR, (2017)Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices., , and . CoRR, (2019)Identifying Internet of Things software activities using deep learning-based electromagnetic side-channel analysis., , , , and . Digit. Investig., (2021)Leveraging Decentralization to Extend the Digital Evidence Acquisition Window: Case Study on Bittorrent Sync., , , and . J. Digit. Forensics Secur. Law, 9 (2): 85-100 (2014)Evaluating Automated Facial Age Estimation Techniques for Digital Forensics., , , and . IEEE Symposium on Security and Privacy Workshops, page 129-139. IEEE Computer Society, (2018)DFRWS EU 10-year review and future directions in Digital Forensic Research., , , , , and . Forensic Sci. Int. Digit. Investig., (2024)Accuracy Enhancement of Electromagnetic Side-Channel Attacks on Computer Monitors., , and . ARES, page 15:1-15:9. ACM, (2018)An Evaluation of AI-Based Network Intrusion Detection in Resource-Constrained Environments., , , and . UEMCON, page 275-282. IEEE, (2023)