Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Database image content explorer: Carving data that does not officially exist., , and . Digit. Investig., (2016)DB3F & DF-Toolkit: The Database Forensic File Format and the Database Forensic Toolkit., , , , and . Digit. Investig., (2019)Purging Data from Backups by Encryption., , , , and . DEXA (1), volume 12923 of Lecture Notes in Computer Science, page 245-258. Springer, (2021)DF-Toolkit: Interacting with Low-Level Database Storage., , , , and . Proc. VLDB Endow., 13 (12): 2845-2848 (2020)Compliance and Data Lifecycle Management in Databases and Backups., , , and . DEXA (1), volume 14146 of Lecture Notes in Computer Science, page 281-297. Springer, (2023)Database Forensic Analysis with DBCarver., , , , , and . CIDR, www.cidrdb.org, (2017)Evaluation of the software bases of the candidate architectures for the military computer family., , , and . AFIPS National Computer Conference, volume 46 of AFIPS Conference Proceedings, page 175-183. AFIPS Press, (1977)SysGen: system state corpus generator., , , and . ARES, page 45:1-45:6. ACM, (2020)Carving database storage to detect and trace security breaches., , , , , , and . Digit. Investig., (2017)What Is Lurking in Your Backups?, , , and . SEC, volume 625 of IFIP Advances in Information and Communication Technology, page 401-415. Springer, (2021)