Author of the publication

Computer forensic analysis model for the reconstruction of chain of evidence of volatile memory data.

, , , and . Multimedia Tools Appl., 75 (16): 10097-10107 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computer forensic analysis model for the reconstruction of chain of evidence of volatile memory data., , , and . Multimedia Tools Appl., 75 (16): 10097-10107 (2016)False positive elimination in intrusion detection based on clustering., , , and . FSKD, page 519-523. IEEE, (2015)SRMCS: A semantic-aware recommendation framework for mobile crowd sensing., , , , and . Inf. Sci., (2018)A Blockchain-Based Reward Mechanism for Mobile Crowdsensing., , , and . IEEE Trans. Comput. Social Systems, 7 (1): 178-191 (2020)Hybrid Blockchain for IoT - Energy Analysis and Reward Plan., , , and . Sensors, 21 (1): 305 (2021)Securing SDN-Controlled IoT Networks Through Edge Blockchain., , , , and . IEEE Internet Things J., 8 (4): 2102-2115 (2021)Blockchain-Aided Flow Insertion and Verification in Software Defined Networks., , , and . GIoTS, page 1-6. IEEE, (2020)A semantics-based approach to multi-source heterogeneous information fusion in the internet of things., , , , and . Soft Comput., 21 (8): 2005-2013 (2017)Mobile Edge Provision with Flexible Deployment., , , , and . IEEE Trans. Serv. Comput., 12 (5): 750-761 (2019)A Dynamic Service Trading in a DLT-Assisted Industrial IoT Marketplace., , , , and . IEEE Trans. Netw. Serv. Manag., 19 (4): 4691-4705 (December 2022)