Author of the publication

Assessing the Legal Risks in Network Forensic Probing.

, , , , , , and . IFIP Int. Conf. Digital Forensics, volume 306 of IFIP Advances in Information and Communication Technology, page 255-266. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Crimes in, of and by virtual worlds and computer gaming.. CGAMES, page 93-98. IEEE Computer Society, (2015)Positing social and justice models for cyber security., , and . CSIIRW, page 78. ACM, (2010)Panel Topic: Education and Interdisciplinary Issues in Digital Forensics, Computer Science and Judicial Process.. SADFE, page 166. IEEE Computer Society, (2007)Network Forensics: Network Data and State Seizures in the United States., , , , and . SADFE, page 143. IEEE Computer Society, (2008)Digital Device & Forensics Concerns in Jails, Prisons and Supervisory Environments., , and . SADFE, page 34-35. IEEE Computer Society, (2009)Digital heritage from the Smart City and the Internet of Things: History or stasis?, , and . Digital Heritage, page 431-434. IEEE, (2015)Assessing the Legal Risks in Network Forensic Probing., , , , , , and . IFIP Int. Conf. Digital Forensics, volume 306 of IFIP Advances in Information and Communication Technology, page 255-266. Springer, (2009)Gap Analysis: Judicial Experience and Perception of Electronic Evidence., , and . J. Digital Forensic Practice, 1 (1): 13-17 (2006)Does Profiling Make Us More Secure?, , , , , , and . IEEE Secur. Priv., 10 (4): 10-15 (2012)The Impact of Low Self-Control on Online Harassment: Interaction with Opportunity., , and . J. Digit. Forensics Secur. Law, 11 (3): 27-42 (2016)