Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Database image content explorer: Carving data that does not officially exist., , and . Digit. Investig., (2016)DB3F & DF-Toolkit: The Database Forensic File Format and the Database Forensic Toolkit., , , , and . Digit. Investig., (2019)Purging Data from Backups by Encryption., , , , and . DEXA (1), volume 12923 of Lecture Notes in Computer Science, page 245-258. Springer, (2021)Ensemble Labeling Towards Scientific Information Extraction (ELSIE)., , , , and . ICCS (1), volume 12742 of Lecture Notes in Computer Science, page 750-764. Springer, (2021)Live Study Proposal: Collecting Natural Language Trace Queries., , , and . REFSQ Workshops, volume 1342 of CEUR Workshop Proceedings, page 207-210. CEUR-WS.org, (2015)Using Provenance for Generating Automatic Citations., , , and . TaPP, USENIX Association, (2018)Building confidence and credibility into CAD with belief decision trees., , , , and . Medical Imaging: Computer-Aided Diagnosis, volume 10134 of SPIE Proceedings, page 101343Z. SPIE, (2017)SysGen: system state corpus generator., , , and . ARES, page 45:1-45:6. ACM, (2020)The Design of the Borealis Stream Processing Engine, , , , , , , , , and 3 other author(s). #CIDR2005#, page 277--289. www.cidrdb.org, (2005)Carving database storage to detect and trace security breaches., , , , , , and . Digit. Investig., (2017)