Author of the publication

Magec: An Image Searching Tool for Detecting Forged Images in Forensic Investigation.

, , , , , and . NTMS, page 1-6. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Study of Detecting Child Pornography on Smart Phone., , , , , , and . NBiS, volume 7 of Lecture Notes on Data Engineering and Communications Technologies, page 373-384. Springer, (2017)Forensic investigation of Google Meet for memory and browser artifacts., , , , and . Digit. Investig., 43 (Supplement): 301448 (2022)Drone Forensics: Challenges and New Insights., , , and . NTMS, page 1-6. IEEE, (2018)Quality Assurance in a Student-Based Agile Software Engineering Process., , and . Australian Software Engineering Conference, page 324-331. IEEE Computer Society, (2005)A Model for Computer Profiling., , , and . ARES, page 635-640. IEEE Computer Society, (2010)Magec: An Image Searching Tool for Detecting Forged Images in Forensic Investigation., , , , , and . NTMS, page 1-6. IEEE, (2016)Computer Profiling for Preliminary Forensic Examination., , and . ICDF2C, volume 132 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 207-220. Springer, (2013)Testing the forensic soundness of forensic examination environments on bootable media., , , and . Digit. Investig., 11 (Supplement 2): S22-S29 (2014)Research Trends in Digital Forensic Science: An Empirical Analysis of Published Research., , , and . ICDF2C, volume 114 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 144-157. Springer, (2012)Factors Influencing Digital Forensic Investigations: Empirical Evaluation of 12 Years of Dubai Police Cases., , , and . J. Digit. Forensics Secur. Law, 10 (4): 7-16 (2015)