Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Testing Digital Forensic Software Tools Used in Expert Testimony., and . Handbook of Research on Computational Forensics, Digital Crime, and Investigation, IGI Global, (2010)Distributed Parallel Computing using Navigational Programming: Orchestrating Computations Around Data., , , , and . IASTED PDCS, page 453-458. IASTED/ACTA Press, (2002)Cross-Project Transfer Representation Learning for Vulnerable Function Discovery., , , , , , and . IEEE Trans. Ind. Informatics, 14 (7): 3289-3297 (2018)A Unified Variational Model for Single Image Dehazing., , , , and . IEEE Access, (2019)Mobile Agents - The Right Vehicle for Distributed Sequential Computing., , , and . HiPC, volume 2552 of Lecture Notes in Computer Science, page 575-586. Springer, (2002)Using Relationship-Building in Event Profiling for Digital Forensic Investigations., and . e-Forensics, volume 56 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 40-52. Springer, (2010)Comprehensive Analysis of Network Traffic Data., , , , , and . CIT, page 423-430. IEEE Computer Society, (2016)Robust performance testing for digital forensic tools., and . Digital Investigation, 6 (1-2): 71-81 (2009)Predicting the Impact of Android Malicious Samples via Machine Learning., , , , , and . IEEE Access, (2019)Distributed Detection of Zero-Day Network Traffic Flows., , , , , and . AusDM, volume 845 of Communications in Computer and Information Science, page 173-191. Springer, (2017)