From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications., и . ISeCure, 4 (2): 137-150 (2012)Adding digital forensic readiness to the email trace header., и . ISSA, ISSA, Pretoria, South Africa, (2010)Mobile cyber-bullying: A proposal for a pre-emptive approach to risk mitigation by employing digital forensic readiness., и . ISSA, ISSA, Pretoria, South Africa, (2011)Applying Machine Trust Models to Forensic Investigations., , , и . IFIP Int. Conf. Digital Forensics, том 222 из IFIP Advances in Information and Communication Technology, стр. 55-65. Springer, (2006)Applying The Biba Integrity Model to Evidence Management., , и . IFIP Int. Conf. Digital Forensics, том 242 из IFIP, стр. 317-327. Springer, (2007)Secure Storage Model for Digital Forensic Readiness., , и . IEEE Access, (2022)A Model for Digital Evidence Admissibility Assessment., и . IFIP Int. Conf. Digital Forensics, том 511 из IFIP Advances in Information and Communication Technology, стр. 23-38. Springer, (2017)User-generated digital forensic evidence in graphic design applications., и . CyberSec, стр. 195-200. IEEE, (2012)Mobile forensics using the harmonised digital forensic investigation process., и . ISSA, стр. 1-10. IEEE, (2014)Introduction., , , и . ISSA, стр. 1. IEEE, (2015)