Author of the publication

Forensic Analysis of Microsoft Teams: Investigating Memory, Disk and Network.

, , , , and . SmartCity360°, volume 442 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 583-601. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving the barrier of communication between healthcare professionals and their patients using a Prescription Tracking System., , , and . IWSSIP, page 282-286. IEEE, (2015)Deep COLA: A Deep COmpetitive Learning Algorithm for Future Home Energy Management Systems., , , , and . IEEE Trans. Emerg. Top. Comput. Intell., 5 (6): 860-870 (2021)Privacy Preserving Issues in the Dynamic Internet of Things (IoT)., , , , and . ISNCC, page 1-6. IEEE, (2020)Methods and techniques to support the development of fraud detection system., , , , and . IWSSIP, page 224-227. IEEE, (2015)Discord Server Forensics: Analysis and Extraction of Digital Evidence., , and . NTMS, page 1-8. IEEE, (2021)Drone Forensics: A Case Study on DJI Phantom 4., , , , and . AICCSA, page 1-6. IEEE Computer Society, (2019)Detecting Intrusions in Federated Cloud Environments Using Security as a Service., , and . DeSE, page 91-96. IEEE, (2015)Forensic Analysis of Fitbit Versa: Android vs iOS., , , and . SP (Workshops), page 318-326. IEEE, (2021)Evaluating Interdependencies and Cascading Failures Using Distributed Attack Graph Generation Methods for Critical Infrastructure Defence., , and . DeSE, page 47-52. IEEE, (2015)A Methodology to Develop Dynamic Cost-Centric Risk Impact Metrics., and . DeSE, page 53-59. IEEE, (2015)