Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Intell: Enabling the Non-Expert Analysis of Large Volumes of Intercepted Network Traffic., , and . CoRR, (2017)An Analysis of BitTorrent Cross-Swarm Peer Participation and Geolocational Distribution., and . CoRR, (2014)Current Challenges and Future Research Areas for Digital Forensic Investigation., , , and . CoRR, (2016)DeepUAge: Improving Underage Age Estimation Accuracy to Aid CSEM Investigation., , and . Digit. Investig., (2020)A Novel Dictionary Generation Methodology for Contextual-Based Password Cracking., , and . IEEE Access, (2022)Hierarchical Bloom Filter Trees for Approximate Matching., , and . CoRR, (2017)HTML5 Zero Configuration Covert Channels: Security Risks and Challenges., , , , and . CoRR, (2015)Methodology for the Automated Metadata-Based Classification of Incriminating Digital Forensic Artefacts., and . ARES, page 43:1-43:8. ACM, (2019)Solid State Drive Forensics: Where Do We Stand?, , and . ICDF2C, volume 259 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 149-164. Springer, (2018)Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees., , and . ICDF2C, volume 216 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 144-157. Springer, (2017)