Author of the publication

A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis.

, , and . Digit. Investig., (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework for a Forensically Sound Harvesting the Dark Web., , and . CECC, page 13:1-13:7. ACM, (2018)Protecting Digital Evidence Integrity by Using Smart Cards., and . ICDF2C, volume 53 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 110-119. Springer, (2010)Exploring Dark Web Crawlers: A Systematic Literature Review of Dark Web Crawlers and Their Implementation., and . IEEE Access, (2023)LEIA: The Live Evidence Information Aggregator: Towards efficient cyber-law enforcement., , and . WorldCIS, page 156-161. IEEE, (2013)A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis., , and . Digit. Investig., (2016)Extended Abstract Digital Forensics Model with Preservation and Protection as Umbrella Principles., , and . KES, volume 35 of Procedia Computer Science, page 812-821. Elsevier, (2014)Quantifying Relevance of Mobile Digital Evidence As They Relate to Case Types: A Survey and a Guide for Best Practices., , and . J. Digit. Forensics Secur. Law, 9 (3): 19-50 (2014)Testing Framework for Mobile Device Forensics Tools., , and . J. Digit. Forensics Secur. Law, 9 (2): 221-234 (2014)Towards Security Attack Event Monitoring for Cyber Physical-Systems., , and . ICISSP, page 722-732. SciTePress, (2023)Recognition of tor malware and onion services., and . J. Comput. Virol. Hacking Tech., 20 (2): 261-275 (June 2024)