Author of the publication

Visualisation of allocated and unallocated data blocks in digital forensics.

. EISMC, page 133-143. Plymouth University, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Contamination of digital evidence: Understanding an underexposed risk., , and . Forensic Sci. Int. Digit. Investig., 44 (Supplement): 301501 (March 2023)An automated timeline reconstruction approach for digital forensic investigations., and . Digit. Investig., 9 (Supplement): S69-S79 (2012)Automated Identification and Reconstruction of YouTube Video Access., and . J. Digit. Forensics Secur. Law, 7 (2): 43-60 (2012)Assessing the reliability of digital evidence from live investigations involving encryption.. Cranfield University, UK, (2009)British Library, EThOS.SyncTriage: Using synchronisation artefacts to optimise acquisition order., and . Digit. Investig., (2019)Detecting Hidden Encrypted Volumes., and . Communications and Multimedia Security, volume 6109 of Lecture Notes in Computer Science, page 233-244. Springer, (2010)Windows Vista and digital investigations., , and . Digital Investigation, 5 (1-2): 34-48 (2008)Visualisation of allocated and unallocated data blocks in digital forensics.. EISMC, page 133-143. Plymouth University, (2013)Forensic data recovery from the Windows Search Database., and . Digital Investigation, 7 (3-4): 114-126 (2011)Using a software exploit to image RAM on an embedded system., and . Digital Investigation, 6 (3-4): 95-103 (2010)