Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MR-VDENCLUE: Varying Density Clustering Using MapReduce., , , , and . IntelliSys (1), volume 542 of Lecture Notes in Networks and Systems, page 771-788. Springer, (2022)A Preliminary Analysis of Drive-by Email Attacks in Educational Institutes., , , and . CCC, page 65-69. IEEE, (2016)Reviewing and Evaluating Existing File Carving Techniques for JPEG Files., and . CCC, page 55-59. IEEE, (2016)Why make it? Understanding undergraduate engineering students' conceptions for the purpose of prototyping in engineering design activities., and . FIE, page 1-5. IEEE, (2018)Data Exfiltration Techniques and Data Loss Prevention System., , , and . ACIT, page 124-127. IEEE, (2019)Exploration of Innovative Spaces that Enable Communication and Collaboration in Diverse Settings., , , , , and . FIE, page 1-6. IEEE, (2023)Design the Future Activities (DFA): Typology of Content for Case Studies.. FIE, page 1-4. IEEE, (2021)HDFS file operation fingerprints for forensic investigations., , and . Digit. Investig., (2018)Covert Communication Using Port Knocking., , and . CCC, page 22-27. IEEE, (2016)MLDED: Multi-layer Data Exfiltration Detection System., , and . CyberSec, page 107-112. IEEE Computer Society, (2015)