Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence., , , and . BDTA, volume 555 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 112-131. Springer, (2023)An Auditable Framework for Evidence Sharing and Management Using Smart Lockers and Distributed Technologies: Law Enforcement Use Case., , , and . BDTA, volume 555 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 156-167. Springer, (2023)A Forensic Audit of the Tor Browser Bundle., , and . Digit. Investig., (2019)Uses of Peer Assessment in Database Teaching and Learning., , and . BNCOD, volume 6121 of Lecture Notes in Computer Science, page 135-146. Springer, (2010)Reducing the Impact of Network Bottlenecks on Remote Contraband Detection., , and . Cyber Security, page 1-7. IEEE, (2018)A New Approach to Space-Time Modelling of Infectious Disease Behaviour., and . Geomed, page 130-140. Vieweg+Teubner Verlag, (1997)A RAM triage methodology for Hadoop HDFS forensics., , and . Digital Investigation, (2016)Fingerprinting JPEGs With Optimised Huffman Tables., , and . J. Digit. Forensics Secur. Law, 13 (2): 7:1-7:14 (2018)Sub-file Hashing Strategies for Fast Contraband Detection., , and . Cyber Security, page 1-7. IEEE, (2018)