Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Forensic analysis of smart TV: A current issue and call to arms., , and . Digit. Investig., 11 (3): 175-178 (2014)Forensic Analysis of the Nintendo 3DS NAND., , , and . Digit. Investig., (2019)Nintendo 3DS Forensic Examination Tools., , , , and . IFIP Int. Conf. Digital Forensics, volume 687 of IFIP Advances in Information and Communication Technology, page 55-70. Springer, (2023)LITCHI: Knowledge Integrity Testing for Taxonomic Databases., , , , , , , and . SSDBM, page 278. IEEE Computer Society, (1999)Conflict Detection for Integration of Taxonomic Data Sources., , , , , , , and . SSDBM, page 204-213. IEEE Computer Society, (1999)A Unified Approach to Network Traffic and Network Security Visualisation., , and . ICC, page 1-6. IEEE, (2009)A Forensic Methodology for Analyzing Nintendo 3DS Devices., , , , and . IFIP Int. Conf. Digital Forensics, volume 484 of IFIP Advances in Information and Communication Technology, page 127-143. Springer, (2016)Distribution of Offensive Material Over Computer Networks: A Research Agenda., , , and . ECIW, page 355-362. Academic Conferences Limited, Reading, UK, (2005)An empirical examination of the reverse engineering process for binary files., , , and . Comput. Secur., 25 (3): 221-228 (2006)Malware and steganography in hard disk firmware., , and . J. Comput. Virol., 7 (3): 215-219 (2011)