Author of the publication

Analysis of secure data deletion and recovery with common digital forensic tools and procedures.

, , and . MIPRO, page 1607-1610. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Creating own NFT token using erc721 standard and solidity programming language., , , and . MIPRO, page 1053-1056. IEEE, (2022)Preparation and Planning of the Development of a Proficiency Test in the Field of Digital Forensics., , , and . MIPRO, page 1208-1212. IEEE, (2021)Comparison of Graduate Specialist Study of Computing and Specialist Study of Information Security and Digital Forensics at the Zagreb University of Applied Sciences., , , and . MIPRO, page 1423-1426. IEEE, (2019)Implementation of Biometric Verification of a Fingerprint Whose Image is Taken from a Glass Surface., , , , and . MIPRO, page 1183-1188. IEEE, (2023)Linux Forensic Triage: Overview of Process and Tools., , and . MIPRO, page 1230-1235. IEEE, (2020)The Forensic Significance of Indexing Applications on the Windows Operating System., , and . MIPRO, page 1179-1182. IEEE, (2023)An Analysis of Wireless Network Security Test Results provided by Raspberry Pi Devices on Kali Linux., , , and . MIPRO, page 1219-1223. IEEE, (2021)Open-Source Intelligence as the New Introduction in the Graduate Cybersecurity Curriculum., , and . MIPRO, page 650-653. IEEE, (2021)How to do a forensic analysis of Android 11 artifacts., , , and . MIPRO, page 1042-1047. IEEE, (2022)What can be learned from the last two years of pandemic and what will be done when the pandemic stops., , , and . MIPRO, page 538-541. IEEE, (2022)