Author of the publication

A Revised Forensic Process for Aligning the Investigation Process with the Design of Forensic-Enabled Cloud Services.

, , , and . e-Democracy, volume 1111 of Communications in Computer and Information Science, page 161-177. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Loneliness, life satisfaction, problematic internet use and security behaviours: re-examining the relationships when working from home during COVID-19., , and . Behav. Inf. Technol., 41 (14): 3161-3175 (2022)Hybrid deep learning models for traffic prediction in large-scale road networks., , , and . Inf. Fusion, (April 2023)IEEE 802.11ax Spatial Reuse Improvement: An Interference-Based Channel-Access Algorithm., , , , and . IEEE Veh. Technol. Mag., 14 (2): 78-84 (2019)An Architecture for Blockchain over Edge-enabled IoT for Smart Circular Cities., , and . DCOSS, page 465-472. IEEE, (2019)Blockchains as Enablers for Auditing Cooperative Circular Economy Networks., , , and . CAMAD, page 1-7. IEEE, (2018)An Ensemble Model for Short-Term Traffic Prediction in Smart City Transportation System., , and . GLOBECOM, page 1-6. IEEE, (2019)A dynamic spatial-temporal deep learning framework for traffic speed prediction on large-scale road networks., , and . Expert Syst. Appl., (2022)R2BN: An Adaptive Model for Keystroke-Dynamics-Based Educational Level Classification., , , , and . IEEE Trans. Cybern., 50 (2): 525-535 (2020)Citizen participation: crowd-sensed sustainable indoor location services., , , , , and . CoRR, (2023)Investigating IPTV Malware in the Wild., , , , and . Future Internet, 15 (10): 325 (2023)