Author of the publication

The role of mobile forensics in terrorism investigations involving the use of cloud apps.

, , , , and . MobiMedia, page 199-204. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Factors Influencing the Adoption of Cloud Incident Handling Strategy: A Preliminary Study in Malaysia., and . CoRR, (2015)A survey of information security incident handling in the cloud., and . Comput. Secur., (2015)Implications of Emerging Technologies to Incident Handling and Digital Forensic Strategies: A Routine Activity Theory., , and . Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, Elsevier, (2017)Implementing Virtual Machine: A Performance Evaluation., , , , and . SCDM, volume 978 of Advances in Intelligent Systems and Computing, page 373-381. Springer, (2020)Cloud incident handling and forensic-by-design: cloud storage as a case study., , and . Concurr. Comput. Pract. Exp., (2017)Integrating digital forensic practices in cloud incident handling: A conceptual Cloud Incident Handling Model., and . The Cloud Security Ecosystem, Elsevier, (2015)Forensic-by-Design Framework for Cyber-Physical Cloud Systems., , , and . IEEE Cloud Comput., 3 (1): 50-59 (2016)The Role of Mobile Forensics in Terrorism Investigations Involving the Use of Cloud Storage Service and Communication Apps., , , and . Mob. Networks Appl., 22 (2): 240-254 (2017)The role of mobile forensics in terrorism investigations involving the use of cloud apps., , , , and . MobiMedia, page 199-204. ACM, (2016)myEntropy: a file type identification tool using entropy scoring., , and . Int. J. Electron. Secur. Digit. Forensics, 14 (1): 76-95 (2022)