From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Validation of Rules Used in Foxy Peer-to-Peer Network Investigations., , и . IFIP Int. Conf. Digital Forensics, том 383 из IFIP Advances in Information and Communication Technology, стр. 231-245. Springer, (2012)Digital Evidence Search Kit., , , , , , и . SADFE, стр. 187-194. IEEE Computer Society, (2005)A Host-Based Approach to BotNet Investigation?, , , и . ICDF2C, том 31 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 161-170. Springer, (2009)An Analysis of the Green Dam Youth Escort Software., , , и . IFIP Int. Conf. Digital Forensics, том 337 из IFIP Advances in Information and Communication Technology, стр. 49-62. Springer, (2010)A Cost-Effective Model for Digital Forensic Investigations., , , , и . IFIP Int. Conf. Digital Forensics, том 306 из IFIP Advances in Information and Communication Technology, стр. 231-240. Springer, (2009)Protecting Digital Data Privacy in Computer Forensic Examination., , , , , , и . SADFE, стр. 1-6. IEEE Computer Society, (2011)Analysis of the Digital Evidence Presented in the Yahoo! Case., , , , и . IFIP Int. Conf. Digital Forensics, том 306 из IFIP Advances in Information and Communication Technology, стр. 241-252. Springer, (2009)Reasoning About Evidence Using Bayesian Networks., , , и . IFIP Int. Conf. Digital Forensics, том 285 из IFIP, стр. 275-289. Springer, (2008)The Rules of Time on NTFS File System., , , и . SADFE, стр. 71-85. IEEE Computer Society, (2007)Improving Disk Sector Integrity Using 3-dimension Hashing Scheme., , , , и . FGCN (2), стр. 141-145. IEEE Computer Society, (2007)