Author of the publication

Fingerprinting JPEGs With Optimised Huffman Tables.

, , and . J. Digit. Forensics Secur. Law, 13 (2): 7:1-7:14 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Amazon Alexa APIs as a Source of Digital Evidence., and . Cyber Security, page 1-8. IEEE, (2020)OPSEC VS Leaked Credentials: Password reuse in Large-Scale Data Leaks., , , and . CAMAD, page 74-79. IEEE, (2023)Investigating people: a qualitative analysis of the search behaviours of open-source intelligence analysts., , , and . IIiX, page 175-184. ACM, (2014)Hamming Distributions of Popular Perceptual Hashing Techniques., and . CoRR, (2022)A Comparative Analysis of Honeypots on Different Cloud Platforms., , , , and . Sensors, 21 (7): 2433 (2021)An Auditable Framework for Evidence Sharing and Management Using Smart Lockers and Distributed Technologies: Law Enforcement Use Case., , , and . BDTA, volume 555 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 156-167. Springer, (2023)Hamming distributions of popular perceptual hashing techniques., and . Forensic Sci. Int. Digit. Investig., 44 (Supplement): 301509 (March 2023)Forensic Considerations for the High Efficiency Image File Format (HEIF)., and . Cyber Security, page 1-8. IEEE, (2020)Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach., , , , and . ICISSP, page 289-298. SCITEPRESS, (2020)Testing And Hardening IoT Devices Against the Mirai Botnet., , , and . Cyber Security, page 1-8. IEEE, (2020)