From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Using Traffic Analysis to Identify Tor Usage - A Proposed Study., , и . Security and Management, стр. 620-623. CSREA Press, (2010)Geotagging Where Cyberspace Comes to Your Place., и . Security and Management, стр. 627-632. CSREA Press, (2010)Fun & Games: An Introduction to Console Forensics.. Security and Management, стр. 609-612. CSREA Press, (2009)Freegate: A Defence against the Pending Censorship of Australia?., и . HAISA, стр. 133-140. University of Plymouth, (2009)Forensic Analysis of a Crash-Damaged Cheerson CX-20 Auto Pathfinder Drone., , , и . J. Digit. Forensics Secur. Law, 13 (4): 5-22 (2018)Firewire Forensics in Modern Operating Systems., и . Security and Management, стр. 635-638. CSREA Press, (2009)Using Traffic Analysis to Identify the Second Generation Onion Router., , и . EUC, стр. 72-78. IEEE Computer Society, (2011)Cold Boot Memory Acquisition: An Investigation into Memory Freezing and Data Retention Claims., и . Security and Management, стр. 620-622. CSREA Press, (2008)The 2010 IDN Homograph Attack Mitigation Survey., и . Security and Management, стр. 611-614. CSREA Press, (2010)Controlled Android Application Execution for the IoT Infrastructure., , , , и . IoT 360 (1), том 169 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 16-26. (2015)