Author of the publication

File Toolkit for Selective Analysis & Reconstruction (FileTSAR) for Large-Scale Networks.

, , , , , , , and . IEEE BigData, page 3059-3065. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ultrablock Forensic Card Reader., , and . J. Digital Forensic Practice, 1 (1): 69-70 (2006)Finding Forensic Information on Creating a Folder in $LogFile of NTFS., and . ICDF2C, volume 88 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 211-225. Springer, (2011)Mobile Phone Forensics Tool Testing: A Database Driven Approach., , and . Int. J. Digit. EVid., (2007)Using Internet Artifacts to Profile a Child Pornography Suspect., and . J. Digit. Forensics Secur. Law, 9 (1): 57-66 (2014)A Novel Skin Tone Detection Algorithm for Contraband Image Analysis., , , and . SADFE, page 3-9. IEEE Computer Society, (2008)A two-dimensional circumplex approach to the development of a hacker taxonomy.. Digital Investigation, 3 (2): 97-102 (2006)Detecting Social Engineering., and . IFIP Int. Conf. Digital Forensics, volume 194 of IFIP, page 67-77. Springer, (2005)Forensic Analysis of Volatile Instant Messaging., , and . IFIP Int. Conf. Digital Forensics, volume 285 of IFIP, page 129-138. Springer, (2008)A Survey of the Legal Issues Facing Digital Forensic Experts., , and . IFIP Int. Conf. Digital Forensics, volume 306 of IFIP Advances in Information and Communication Technology, page 267-276. Springer, (2009)SMIRK: SMS Management and Information Retrieval Kit., , and . ICDF2C, volume 31 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 33-42. Springer, (2009)