From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Network Intell: Enabling the Non-Expert Analysis of Large Volumes of Intercepted Network Traffic., , и . CoRR, (2017)An Analysis of BitTorrent Cross-Swarm Peer Participation and Geolocational Distribution., и . CoRR, (2014)Current Challenges and Future Research Areas for Digital Forensic Investigation., , , и . CoRR, (2016)Methodology for the Automated Metadata-Based Classification of Incriminating Digital Forensic Artefacts., и . ARES, стр. 43:1-43:8. ACM, (2019)DeepUAge: Improving Underage Age Estimation Accuracy to Aid CSEM Investigation., , и . Digit. Investig., (2020)Hierarchical Bloom Filter Trees for Approximate Matching., , и . CoRR, (2017)HTML5 Zero Configuration Covert Channels: Security Risks and Challenges., , , , и . CoRR, (2015)A Novel Dictionary Generation Methodology for Contextual-Based Password Cracking., , и . IEEE Access, (2022)Solid State Drive Forensics: Where Do We Stand?, , и . ICDF2C, том 259 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 149-164. Springer, (2018)Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees., , и . ICDF2C, том 216 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 144-157. Springer, (2017)