Author of the publication

Triage-based automated analysis of evidence in court cases of copyright infringement.

, , , and . ICC, page 6668-6672. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Forensic disk image indexing and search in an HPC environment., , , , , , and . HPCS, page 558-565. IEEE, (2014)Triage-based automated analysis of evidence in court cases of copyright infringement., , , and . ICC, page 6668-6672. IEEE, (2012)Local Authentication with Bluetooth enabled Mobile Devices., , and . ICAS/ICNS, page 72. IEEE Computer Society, (2005)The Botnet Revenue Model., and . SIN, page 459. ACM, (2014)A Survey of PDA Forensic Investigation., and . International Conference on Wireless Networks, page 583-590. CSREA Press, (2003)Investigation Strategy for the Small Pedophiles World.. Encyclopedia of Information Ethics and Security, IGI Global, (2007)A Secure Mobile Local Payment Application Framework.. Security and Management, page 85-92. CSREA Press, (2003)EC-PAY: An Efficient and Secure ECC-Based Wireless Local Payment Scheme., and . ICITA (2), page 442-447. IEEE Computer Society, (2005)Discovering Hidden Relations Between Tor Marketplaces Users., , and . DASC/PiCom/DataCom/CyberSciTech, page 494-501. IEEE Computer Society, (2017)Transaction Oriented Text Messaging with Trusted-SMS., , , and . ACSAC, page 485-494. IEEE Computer Society, (2008)