Author of the publication

A Closer Look at Syncany Windows and Ubuntu Clients' Residual Artefacts.

, , , , , and . SpaCCS Workshops, volume 10067 of Lecture Notes in Computer Science, page 342-357. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effective Dimensionality Reduction of Payload-Based Anomaly Detection in TMAD Model for HTTP Payload., , , and . KSII Trans. Internet Inf. Syst., 10 (8): 3884-3910 (2016)Issues and Challenges in Anomaly Intrusion Detection for HTTP Web Services., , , , and . J. Comput. Sci., 11 (11): 1041-1053 (2015)The Impact of Memory-Efficient Bots on IoT-WSN Botnet Propagation., , , and . Wirel. Pers. Commun., 119 (3): 2093-2105 (2021)Mobile forensic data acquisition in Firefox OS., , , and . CyberSec, page 27-31. IEEE, (2014)An effective security alert mechanism for real-time phishing tweet detection on Twitter., , , , and . Comput. Secur., (2019)A Closer Look at Syncany Windows and Ubuntu Clients' Residual Artefacts., , , , , and . SpaCCS Workshops, volume 10067 of Lecture Notes in Computer Science, page 342-357. (2016)Malicious node identification routing and protection mechanism for vehicular ad-hoc network against various attacks., , , and . Int. J. Netw. Virtual Organisations, 19 (2/3/4): 153-175 (2018)An intelligent DDoS attack detection tree-based model using Gini index feature selection method., , , , and . Microprocess. Microsystems, (April 2023)An overview of attacks against digital watermarking and their respective countermeasures., , , and . CyberSec, page 265-270. IEEE, (2012)Metamorphic malware detection using structural features and nonnegative matrix factorization with hidden markov model., , , and . J. Comput. Virol. Hacking Tech., 18 (3): 183-203 (2022)