Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobile forensics using the harmonised digital forensic investigation process., and . ISSA, page 1-10. IEEE, (2014)Introduction., , , and . ISSA, page 1. IEEE, (2015)Proof of Concept of the Online Neighbourhood Watch System., and . AFRICOMM, volume 171 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 78-93. (2015)Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications., and . ISeCure, 4 (2): 137-150 (2012)A Model for Digital Evidence Admissibility Assessment., and . IFIP Int. Conf. Digital Forensics, volume 511 of IFIP Advances in Information and Communication Technology, page 23-38. Springer, (2017)Applying Machine Trust Models to Forensic Investigations., , , and . IFIP Int. Conf. Digital Forensics, volume 222 of IFIP Advances in Information and Communication Technology, page 55-65. Springer, (2006)Applying The Biba Integrity Model to Evidence Management., , and . IFIP Int. Conf. Digital Forensics, volume 242 of IFIP, page 317-327. Springer, (2007)Mobile cyber-bullying: A proposal for a pre-emptive approach to risk mitigation by employing digital forensic readiness., and . ISSA, ISSA, Pretoria, South Africa, (2011)Adding digital forensic readiness to the email trace header., and . ISSA, ISSA, Pretoria, South Africa, (2010)User-generated digital forensic evidence in graphic design applications., and . CyberSec, page 195-200. IEEE, (2012)