Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computer Forensic Analysis of Private Browsing Modes., and . ICGS3, volume 534 of Communications in Computer and Information Science, page 96-109. Springer, (2015)How Good Are We at Detecting a Phishing Attack? Investigating the Evolving Phishing Attack Email and Why It Continues to Successfully Deceive Society., , and . SN Comput. Sci., 3 (2): 170 (2022)An ad hoc detailed review of digital forensic investigation process models.. Int. J. Electron. Secur. Digit. Forensics, 8 (3): 205-223 (2016)Digital Forensics: Challenges and Opportunities for Future Studies., , , , , and . Int. J. Organ. Collect. Intell., 10 (2): 37-53 (2020)A standardised data acquisition process model for digital forensic investigations.. Int. J. Inf. Comput. Secur., 9 (3): 229-249 (2017)Integrated Computer Forensics Investigation Process Model (ICFIPM) for Computer Crime Investigations., , and . ICGS3, volume 534 of Communications in Computer and Information Science, page 83-95. Springer, (2015)Gauging the effectiveness of computer misuse act in dealing with cybercrimes., , and . Cyber Security And Protection Of Digital Services, page 1-5. IEEE, (2016)Internet of things devices: digital forensic process and data reduction., , , , and . Int. J. Electron. Secur. Digit. Forensics, 12 (4): 424-436 (2020)Countering Cyberterrorism - The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity. Advances in Information Security Springer, (2023)Next-Generation Digital Forensics: Challenges and Future Paradigms., and . ICGS3, IEEE, (2019)