From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Exploring Dark Web Crawlers: A Systematic Literature Review of Dark Web Crawlers and Their Implementation., и . IEEE Access, (2023)Protecting Digital Evidence Integrity by Using Smart Cards., и . ICDF2C, том 53 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 110-119. Springer, (2010)A Framework for a Forensically Sound Harvesting the Dark Web., , и . CECC, стр. 13:1-13:7. ACM, (2018)LEIA: The Live Evidence Information Aggregator: Towards efficient cyber-law enforcement., , и . WorldCIS, стр. 156-161. IEEE, (2013)A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis., , и . Digit. Investig., (2016)Extended Abstract Digital Forensics Model with Preservation and Protection as Umbrella Principles., , и . KES, том 35 из Procedia Computer Science, стр. 812-821. Elsevier, (2014)Quantifying Relevance of Mobile Digital Evidence As They Relate to Case Types: A Survey and a Guide for Best Practices., , и . J. Digit. Forensics Secur. Law, 9 (3): 19-50 (2014)Towards Security Attack Event Monitoring for Cyber Physical-Systems., , и . ICISSP, стр. 722-732. SciTePress, (2023)Testing Framework for Mobile Device Forensics Tools., , и . J. Digit. Forensics Secur. Law, 9 (2): 221-234 (2014)Recognition of tor malware and onion services., и . J. Comput. Virol. Hacking Tech., 20 (2): 261-275 (июня 2024)