Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Time is on my side: Steganography in filesystem metadata., , , , , and . Digit. Investig., (2016)On Modelling the Power Consumption of a Backbone Network., , and . ICC Workshops, page 1842-1847. IEEE, (2023)Quantifying Windows File Slack Size and Stability., , , , , and . IFIP Int. Conf. Digital Forensics, volume 410 of IFIP Advances in Information and Communication Technology, page 183-193. Springer, (2013)Enter Sandbox: Android Sandbox Comparison., , , , , , and . CoRR, (2014)Effectiveness of file-based deduplication in digital forensics., , and . Secur. Commun. Networks, 9 (15): 2876-2885 (2016)Gradually Improving the Forensic Process., , , and . ARES, page 404-410. IEEE Computer Society, (2015)Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools., , , , , , and . EuroS&P, page 319-333. IEEE, (2017)Real-Time Forensics Through Endpoint Visibility., , , , and . ICDF2C, volume 216 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 18-32. Springer, (2017)Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS., , , and . ARES, page 33:1-33:6. ACM, (2017)On Reducing Bottlenecks in Digital Forensics., and . ERCIM News, (2016)