Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computer Forensic Analysis of Private Browsing Modes., and . ICGS3, volume 534 of Communications in Computer and Information Science, page 96-109. Springer, (2015)How Good Are We at Detecting a Phishing Attack? Investigating the Evolving Phishing Attack Email and Why It Continues to Successfully Deceive Society., , and . SN Comput. Sci., 3 (2): 170 (2022)An ad hoc detailed review of digital forensic investigation process models.. Int. J. Electron. Secur. Digit. Forensics, 8 (3): 205-223 (2016)A standardised data acquisition process model for digital forensic investigations.. Int. J. Inf. Comput. Secur., 9 (3): 229-249 (2017)Digital Forensics: Challenges and Opportunities for Future Studies., , , , , and . Int. J. Organ. Collect. Intell., 10 (2): 37-53 (2020)Gauging the effectiveness of computer misuse act in dealing with cybercrimes., , and . Cyber Security And Protection Of Digital Services, page 1-5. IEEE, (2016)Integrated Computer Forensics Investigation Process Model (ICFIPM) for Computer Crime Investigations., , and . ICGS3, volume 534 of Communications in Computer and Information Science, page 83-95. Springer, (2015)Internet of things devices: digital forensic process and data reduction., , , , and . Int. J. Electron. Secur. Digit. Forensics, 12 (4): 424-436 (2020)Countering Cyberterrorism - The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity. Advances in Information Security Springer, (2023)Multi-Platform Architecture for Cooperative Pedestrian Navigation Applications., , , , and . IPIN, page 1-8. IEEE, (2019)