Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating Automated Facial Age Estimation Techniques for Digital Forensics., , , and . IEEE Symposium on Security and Privacy Workshops, page 129-139. IEEE Computer Society, (2018)Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices., , and . CoRR, (2019)Leveraging Decentralization to Extend the Digital Evidence Acquisition Window: Case Study on Bittorrent Sync., , , and . J. Digit. Forensics Secur. Law, 9 (2): 85-100 (2014)Increasing digital investigator availability through efficient workflow management and automation., , , , and . CoRR, (2017)Forensic Analysis of Epic Privacy Browser on Windows Operating Systems., , and . CoRR, (2017)Battling the Digital Forensic Backlog through Data Deduplication.. CoRR, (2016)Identifying Internet of Things software activities using deep learning-based electromagnetic side-channel analysis., , , , and . Digit. Investig., (2021)Accuracy Enhancement of Electromagnetic Side-Channel Attacks on Computer Monitors., , and . ARES, page 15:1-15:9. ACM, (2018)An Evaluation of AI-Based Network Intrusion Detection in Resource-Constrained Environments., , , and . UEMCON, page 275-282. IEEE, (2023)DFRWS EU 10-year review and future directions in Digital Forensic Research., , , , , and . Forensic Sci. Int. Digit. Investig., (2024)