Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The AVQ Algorithm: Watermarking and Compression Performances., , , and . INCoS, page 698-702. IEEE Computer Society, (2011)Automated Production of Predetermined Digital Evidence., , , and . IEEE Access, (2013)Automatic, Selective and Secure Deletion of Digital Evidence., , , and . BWCCA, page 392-398. IEEE Computer Society, (2011)Using HTML5 to prevent detection of drive-by-download web malware., , and . Secur. Commun. Networks, 8 (7): 1237-1255 (2015)Forensically-Sound Methods to Collect Live Network Evidence., , , and . AINA, page 405-412. IEEE Computer Society, (2013)A Novel Methodology to Acquire Live Big Data Evidence from the Cloud., , , , and . IEEE Trans. Big Data, 5 (4): 425-438 (2019)Automated Construction of a False Digital Alibi., , , , and . ARES, volume 6908 of Lecture Notes in Computer Science, page 359-373. Springer, (2011)On the Construction of a False Digital Alibi on the Android OS., , , , and . INCoS, page 685-690. IEEE Computer Society, (2011)The Forensic Analysis of a False Digital Alibi., , , , , and . IMIS, page 114-121. IEEE Computer Society, (2012)A Review of Security Attacks on the GSM Standard., , , and . ICT-EurAsia, volume 7804 of Lecture Notes in Computer Science, page 507-512. Springer, (2013)