Author of the publication

Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization.

, , , , , and . VizSEC, volume 5210 of Lecture Notes in Computer Science, page 80-86. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What Do Developers Reply To? An Empirical Study of the Top Unmanned Aerial Vehicles (UAVs) Apps (S)., , and . SEKE, page 261-264. KSI Research Inc., (2021)Concept Mapping for Digital Forensic Investigations., and . IFIP Int. Conf. Digital Forensics, volume 306 of IFIP Advances in Information and Communication Technology, page 291-300. Springer, (2009)A Discovery Learning Approach to Information Assurance Education., and . HICSS, page 1-9. IEEE Computer Society, (2009)YouTube Monetization and Censorship by Proxy: A Machine Learning Prospective., , , and . EUSPN/ICTH, volume 198 of Procedia Computer Science, page 23-32. Elsevier, (2021)Preparing for Large-Scale Investigations with Case Domain Modeling., and . DFRWS, (2005)A Theoretical Process Model for Smartphones., , , and . ACITY (3), volume 178 of Advances in Intelligent Systems and Computing, page 279-290. Springer, (2012)Experiments in hiding data inside the file structure of common office documents: a stegonography application., and . ISICT, volume 90 of ACM International Conference Proceeding Series, page 146-151. Trinity College Dublin, (2004)Automated Merging of Software Prototypes., , and . SEKE, page 604-611. Knowledge Systems Institute, (1993)Evaluation of the Semi-automated Crime-Specific Digital Triage Process Model., and . IFIP Int. Conf. Digital Forensics, volume 410 of IFIP Advances in Information and Communication Technology, page 83-98. Springer, (2013)Teaching Hypervisor Design, Implementation, and Control to Undergraduate Computer Science and Computer Engineering Students., , and . HICSS, page 5613-5622. IEEE Computer Society, (2012)