Author of the publication

Virtualization and Digital Forensics: A Research and Education Agenda.

, , , , , , , and . J. Digital Forensic Practice, 2 (2): 62-73 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Remote Virtual Information Assurance Network., , and . SEC, volume 232 of IFIP, page 485-490. Springer, (2007)Reaching Today's Information Security Students., , and . World Conference on Information Security Education, volume 406 of IFIP Advances in Information and Communication Technology, page 218-225. Springer, (2009)Using Phishing for User Email Security Awareness., and . SEC, volume 201 of IFIP, page 454-459. Springer, (2006)Phishing for user security awareness., , and . Comput. Secur., 26 (1): 73-80 (2007)Standards-Based Cyber Exercises., , and . ARES, page 738-743. IEEE Computer Society, (2009)Teaching secure coding: report from summit on education in secure software., , , , , and . SIGCSE, page 581-582. ACM, (2012)Virtualization and Digital Forensics: A Research and Education Agenda., , , , , , , and . J. Digital Forensic Practice, 2 (2): 62-73 (2008)Information Assurance and Security in the ACM/IEEE CS2013.. World Conference on Information Security Education, volume 406 of IFIP Advances in Information and Communication Technology, page 48-57. Springer, (2013)Öut of the Box" Forensics Labs., and . HICSS, page 265. IEEE Computer Society, (2007)Skype Fingerprint.. HICSS, page 484. IEEE Computer Society, (2008)