Author of the publication

Digital Forensics and Crime Investigation: Legal Issues in Prosecution at National Level.

, , and . SADFE, page 133-140. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extended approximate string matching algorithms to detect name aliases., , and . ISI, page 216-219. IEEE, (2011)Verification-driven slicing of UML/OCL models., , , and . ASE, page 185-194. ACM, (2010)Modeling Suspicious Email Detection using Enhanced Feature Selection., , , and . CoRR, (2013)Crime Analysis using Open Source Information., , , , , and . CoRR, (2019)Semantic Analysis of FBI News Reports., and . ICONIP (4), volume 7666 of Lecture Notes in Computer Science, page 322-329. Springer, (2012)Structural Analysis and Destabilizing Terrorist Networks., and . DMIN, page 296-302. CSREA Press, (2006)Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies, , , and . Intelligence and Security Informatics, volume 5075 of Lecture Notes in Computer Science, Springer, Berlin / Heidelberg, (2008)Digital Forensics and Crime Investigation: Legal Issues in Prosecution at National Level., , and . SADFE, page 133-140. IEEE Computer Society, (2010)Evolution of Terrorist Network Using Clustered Approach: A Case Study., and . EISIC, page 116-122. IEEE Computer Soecity, (2011)Cluster Based Text Classification Model., , and . Counterterrorism and Open Source Intelligence, volume 2 of Lecture Notes in Social Networks, Springer, (2011)