From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cloud Forensic Technical Challenges and Solutions: A Snapshot., и . IEEE Cloud Comput., 1 (4): 20-25 (2014)Enhancing User Privacy on Android Mobile Devices via Permissions Removal., , и . HICSS, стр. 5070-5079. IEEE Computer Society, (2014)A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management., , , и . TrustCom/BigDataSE/ISPA (1), стр. 1073-1080. IEEE, (2015)Android Cache Taxonomy and Forensic Process., , и . TrustCom/BigDataSE/ISPA (1), стр. 1094-1101. IEEE, (2015)Cloud computing and its implications for cybercrime investigations in Australia., , и . Comput. Law Secur. Rev., 29 (2): 152-163 (2013)Ubuntu One investigation: Detecting evidences on client machines., , , и . The Cloud Security Ecosystem, Elsevier, (2015)An Approach to Enhance Understanding of Digital Forensics Technical Terms in the Presentation Phase of a Digital Investigation Using Multimedia Presentations., , , и . SecureComm (2), том 255 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 488-506. Springer, (2018)Enforcing File System Permissions on Android External Storage: Android File System Permissions (AFP) Prototype and ownCloud., , и . TrustCom, стр. 949-954. IEEE Computer Society, (2014)The Role of the Adversary Model in Applied Security Research., , и . IACR Cryptology ePrint Archive, (2018)Building the Next Generation of Cyber Security Professionals., и . ECIS, (2014)