Author of the publication

Frameworks in Evidence Collection in Forensics by Analyzing Temporal Cloud Storage Forensics.

, , and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 904-913. IOS Press, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Internet forensics on the basis of evidence gathering with Peep attacks., and . Comput. Stand. Interfaces, 29 (4): 423-429 (2007)Procedure guidance for Internet forensics coping with copyright arguments of client-server-based P2P models., , and . Comput. Stand. Interfaces, 31 (4): 795-800 (2009)The Cyberbullying Assessment of Capable Guardianship in Routine Activity Theory., , and . PAISI, volume 10241 of Lecture Notes in Computer Science, page 3-14. (2017)The Proposed PDCA Model to Counter Money Laundering., , and . KES, volume 207 of Procedia Computer Science, page 2454-2463. Elsevier, (2022)Exploring drug-related crimes with social network analysis., , , and . KES, volume 159 of Procedia Computer Science, page 1907-1917. Elsevier, (2019)ATM Heist Threats: A Proposed ICT Governance Strategy.. ICACT, page 610-615. IEEE, (2019)Digitized Forensic Investigation at P2P Copyright Controversy, Infringement., , and . ISI, volume 3975 of Lecture Notes in Computer Science, page 644-646. Springer, (2006)Privacy Concealments: Detective Strategies Unveiling Cyberstalking on Internet., , , , and . APSCC, page 1364-1368. IEEE Computer Society, (2008)Ön the left side, there's nothing right. On the right side, there's nothing left: " Polarization of Political Opinion by News Media., , , , and . iConference, volume 12051 of Lecture Notes in Computer Science, page 209-219. Springer, (2020)A Framework for SQL Injection Investigations: Detection, Investigation, and Forensics., , and . SMC, page 2838-2843. IEEE, (2018)