Author of the publication

Classifying the Authenticity of Evaluated Smartphone Data.

, , and . IFIP Int. Conf. Digital Forensics, volume 569 of IFIP Advances in Information and Communication Technology, page 39-57. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Isolating Instances in Cloud Forensics., and . IFIP Int. Conf. Digital Forensics, volume 383 of IFIP Advances in Information and Communication Technology, page 187-200. Springer, (2012)On granting limited access to private information., and . WWW, page 21-25. ACM, (2001)Data Hiding Techniques for Database Environments., and . IFIP Int. Conf. Digital Forensics, volume 383 of IFIP Advances in Information and Communication Technology, page 289-301. Springer, (2012)Detecting Manipulated Smartphone Data on Android and iOS Devices., , and . ISSA (Revised Selected Papers), volume 973 of Communications in Computer and Information Science, page 89-103. Springer, (2018)Increasing Firewall Reliability by Recording Routes., and . Communications and Multimedia Security, volume 70 of IFIP Conference Proceedings, page 303-314. Chapman & Hall, (1996)Alter-egos and Roles: Supporting Workflow Security in Cyberspaces., , , and . DBSec, volume 113 of IFIP Conference Proceedings, page 182-195. Chapman & Hall, (1997)PIDS: A Privacy Intrusion Detection Systems, , and . Internet Research, 14 (5): 360--365 (2004)A Layered Architecture for Privacy-enhancing Technologies. South African Computer Journal, (2003)Ideal log setting for database forensics reconstruction., and . Digit. Investig., (2015)Emergency Privacy Measures., and . CSE (3), page 324-329. IEEE Computer Society, (2009)