Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A study on vulnerability of the Wickr login system in windows from a live forensics perspective., , , and . Comput. Secur., (2024)Methods for decrypting the data encrypted by the latest Samsung smartphone backup programs in Windows and macOS., , , and . Digit. Investig., (2021)Prediction of vowel identification for cochlear implant using a computational model., , , , , and . Speech Commun., (2016)Visualizing Tacit Knowledge in Cardiac Operating Room: A Need-Finding Study., , , , and . HCI (21), volume 13322 of Lecture Notes in Computer Science, page 149-161. Springer, (2022)The Analysis of Film Flow Around Rotating Roller Partially Immersed Ink., , , and . ICCSA (2), volume 4706 of Lecture Notes in Computer Science, page 951-960. Springer, (2007)Forensic analysis for multi-platform Cisco Webex., , , and . Forensic Sci. Int. Digit. Investig., (December 2023)Effects of Electrode Position on Spatiotemporal Auditory Nerve Fiber Responses: A 3D Computational Model Study., , , , , , and . Comput. Math. Methods Medicine, (2015)A Method for Decrypting Data Infected with Rhysida Ransomware., , , , and . CoRR, (2024)Smartphone-Based Hearing Screening in Noisy Environments., , , , , and . Sensors, 14 (6): 10346-10360 (2014)A Method for Decrypting Data Infected with Hive Ransomware., , , and . CoRR, (2022)