Author of the publication

Analysis of secure data deletion and recovery with common digital forensic tools and procedures.

, , and . MIPRO, page 1607-1610. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Creating own NFT token using erc721 standard and solidity programming language., , , and . MIPRO, page 1053-1056. IEEE, (2022)Preparation and Planning of the Development of a Proficiency Test in the Field of Digital Forensics., , , and . MIPRO, page 1208-1212. IEEE, (2021)The Forensic Significance of Indexing Applications on the Windows Operating System., , and . MIPRO, page 1179-1182. IEEE, (2023)An Analysis of Wireless Network Security Test Results provided by Raspberry Pi Devices on Kali Linux., , , and . MIPRO, page 1219-1223. IEEE, (2021)Open-Source Intelligence as the New Introduction in the Graduate Cybersecurity Curriculum., , and . MIPRO, page 650-653. IEEE, (2021)How to do a forensic analysis of Android 11 artifacts., , , and . MIPRO, page 1042-1047. IEEE, (2022)What can be learned from the last two years of pandemic and what will be done when the pandemic stops., , , and . MIPRO, page 538-541. IEEE, (2022)Comparative Analysis of Network Forensic Tools on Different Operating Systems., , and . MIPRO, page 1231-1235. IEEE, (2021)Setting up digital forensics laboratory: Experience of Zagreb University of Applied Sciences., , and . MIPRO, page 530-533. IEEE, (2018)Implementation of virtual digital forensic class and laboratory for training, education and investigation., , , , , , and . MIPRO, page 1175-1180. IEEE, (2019)