Author of the publication

Discussion on the Challenges and Opportunities of Cloud Forensics.

, and . CD-ARES, volume 7465 of Lecture Notes in Computer Science, page 593-608. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A reference model for risk-aware business process management., and . CRiSIS, page 82-89. IEEE, (2009)Facebook Watchdog: A Research Agenda for Detecting Online Grooming and Bullying Activities., , and . SMC, page 2854-2859. IEEE, (2013)Penetration Testing Artificial Intelligence., , , and . ERCIM News, (2020)Evidence and Cloud Computing: The Virtual Machine Introspection Approach., , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 4 (1): 135-152 (2013)A process model for RFID based Business Process Analysis., , , , and . APSCC, page 478-483. IEEE, (2009)Contrology - An Ontology-Based Cloud Assurance Approach., , and . WETICE, page 105-107. IEEE Computer Society, (2015)A Readiness Model for Measuring the Maturity of Cyber Security Incident Management., and . INCoS, volume 23 of Lecture Notes on Data Engineering and Communications Technologies, page 283-293. Springer, (2018)Planning Dynamic Activity and Resource Allocations Using a Risk-Aware Business Process Management Approach., , , and . ARES, page 268-274. IEEE Computer Society, (2010)Forensics Investigations of Multimedia Data: A Review of the State-of-the-Art., and . IMF, page 48-61. IEEE Computer Society, (2011)Classification and Recovery of Fragmented Multimedia Files using the File Carving Approach., , , and . IJMCMC, 5 (3): 50-67 (2013)