Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Volatile Memory Collection and Analysis for Windows Mission-Critical Computer Systems., and . Int. J. Digit. Crime Forensics, 1 (3): 42-61 (2009)A Comparison between Windows Mobile and Symbian S60 Embedded Forensics., , and . IIH-MSP, page 546-550. IEEE Computer Society, (2009)Recovery of Damaged Compressed Files for Digital Forensic Purposes., , , , , and . MUE, page 365-372. IEEE Computer Society, (2008)Modern ships Voyage Data Recorders: A forensics perspective on the Costa Concordia shipwreck., and . Digit. Investig., 10 (Supplement): S41-S49 (2013)Logical and physical data collection of Windows CE based portable devices., and . SAC, page 1448-1449. ACM, (2008)Uncertainty in Live Forensics., , and . IFIP Int. Conf. Digital Forensics, volume 337 of IFIP Advances in Information and Communication Technology, page 171-184. Springer, (2010)SIMbrush: an Open Source Tool for GSM and UMTS Forensics Analysis., , and . SADFE, page 105-119. IEEE Computer Society, (2005)A Methodology to Improve the Detection Accuracy in Digital Steganalysis., and . IIH-MSP, page 373-376. IEEE Computer Society, (2006)Workspace and Methodology Management in the Octtools Environment., and . VLSI, volume A-1 of IFIP Transactions, page 307-316. North-Holland, (1991)A VHDL-based approach for power estimation of embedded systems., , , and . J. Syst. Archit., 44 (1): 37-61 (1997)