Author of the publication

Towards the Development of a Cloud Forensics Methodology: A Conceptual Model.

, , , and . CAiSE Workshops, volume 215 of Lecture Notes in Business Information Processing, page 470-481. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Incorporating privacy requirements into the system design process, , , and . Internet Research, 16 (2): 140--158 (2006)End to end secure communication in ad-hoc assistive medical environments using secure paths., , , and . PETRA, ACM, (2009)Digital privacy and social capital on social network sites. friends or foes?, , , and . STAST, page 3-16. ACM, (2016)Source Code Author Identification Based on N-gram Author Profiles., , , and . AIAI, volume 204 of IFIP, page 508-515. Springer, (2006)Delivering Attribute Certificates over GPRS., , and . SAC, page 1166-1170. ACM, (2004)Secure Electronic Healthcare Records Management in Wireless Environments., , and . J. Inf. Technol. Res., 4 (4): 1-17 (2011)DoS attacks exploiting signaling in UMTS and IMS., , , and . Comput. Commun., 34 (3): 226-235 (2011)ADoCSI: towards a transparent mechanism for disseminating Certificate Status Information., , and . Comput. Commun., 26 (16): 1851-1862 (2003)Experimental Analysis of an SSL-Based AKA Mechanism in 3G-and-Beyond Wireless Networks., , and . Wirel. Pers. Commun., 29 (3-4): 303-321 (2004)The Cascade Vulnerability Problem: the detection problem and a simulated annealing approach for its correction., and . Microprocess. Microsystems, 21 (10): 621-627 (1998)