Author of the publication

Forensic Implications of Using the Firewire Memory Exploit with Microsoft Windows XP.

, and . Security and Management, page 593-597. CSREA Press, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On 802.11 Access Point Locatability and Named Entity Recognition in Service Set Identifiers., , and . IEEE Trans. Inf. Forensics Secur., 11 (3): 584-593 (2016)Firewire Forensics in Modern Operating Systems., and . Security and Management, page 635-638. CSREA Press, (2009)Forensic Analysis of a Crash-Damaged Cheerson CX-20 Auto Pathfinder Drone., , , and . J. Digit. Forensics Secur. Law, 13 (4): 5-22 (2018)Using Traffic Analysis to Identify the Second Generation Onion Router., , and . EUC, page 72-78. IEEE Computer Society, (2011)The 2010 IDN Homograph Attack Mitigation Survey., and . Security and Management, page 611-614. CSREA Press, (2010)Controlled Android Application Execution for the IoT Infrastructure., , , , and . IoT 360 (1), volume 169 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 16-26. (2015)Cold Boot Memory Acquisition: An Investigation into Memory Freezing and Data Retention Claims., and . Security and Management, page 620-622. CSREA Press, (2008)Service Set Identifier Geolocation for Forensic Purposes: Opportunities and Challenges., , and . HICSS, page 5487-5496. IEEE Computer Society, (2016)Fun & Games: An Introduction to Console Forensics.. Security and Management, page 609-612. CSREA Press, (2009)Using Traffic Analysis to Identify Tor Usage - A Proposed Study., , and . Security and Management, page 620-623. CSREA Press, (2010)