Author of the publication

A Turing Machine-Based Model for Computer Forensic Reconstruction.

, , and . SSIRI, page 289-290. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dual-level contrastive learning network for generalized zero-shot learning., , , , and . Vis. Comput., 38 (9): 3087-3095 (2022)Asynchronous Callback in Web Services., , and . SNPD, page 375-380. IEEE Computer Society, (2006)LiveForen: Ensuring Live Forensic Integrity in the Cloud., , , , and . IEEE Trans. Inf. Forensics Secur., 14 (10): 2749-2764 (2019)A direct up-conversion transmitter architecture for TD-SCDMA handset., , and . PIMRC, page 2900-2904. IEEE, (2003)Generating Orthogonal Voronoi Treemap for Visualization of Hierarchical Data., , , and . CGI, volume 12221 of Lecture Notes in Computer Science, page 394-402. Springer, (2020)A Parallel Prefix Convex Hill Algorithm Using MasPar., , and . PDPTA, page 1089-1095. CSREA Press, (2002)Towards a forensic-aware file system., and . EIT, page 84-89. IEEE, (2008)Resource Allocation Optimization for GSD Projects., , , and . ICCSA (2), volume 5593 of Lecture Notes in Computer Science, page 13-28. Springer, (2009)A Framework for Enhancing Web Services Security., and . COMPSAC (1), page 23-30. IEEE Computer Society, (2007)Triple Disentangling Network for Unsupervised Domain Adaptation., , , , , and . ICME, page 1-6. IEEE, (2022)