Author of the publication

Chracer: Memory analysis of Chromium-based browsers.

, , , and . Forensic Sci. Int. Digit. Investig., 46 (Supplement): 301613 (October 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A recovery method of deleted record for SQLite database., , , and . Pers. Ubiquitous Comput., 16 (6): 707-715 (2012)Damaged backup data recovery method for Windows mobile., , , and . J. Supercomput., 66 (2): 875-887 (2013)A Stepwise Methodology for Tracing Computer Usage., , , , and . NCM, page 1852-1857. IEEE Computer Society, (2009)Secure USB bypassing tool., , and . Digit. Investig., 7 (Supplement): S114-S120 (2010)A Field Guide to Hidden Accounting Information Detection., , , , and . FGCN (2), page 146-150. IEEE Computer Society, (2007)Chracer: Memory analysis of Chromium-based browsers., , , and . Forensic Sci. Int. Digit. Investig., 46 (Supplement): 301613 (October 2023)USB PassOn: Secure USB Thumb Drive Forensic Toolkit., , , , , and . FGCN (2), page 279-282. IEEE Computer Society, (2008)978-0-7695-3431-2.Analysis of Time Information for Digital Investigation., , , and . NCM, page 1858-1864. IEEE Computer Society, (2009)IF-DSS: A forensic investigation framework for decentralized storage services., , , , and . Forensic Sci. Int. Digit. Investig., 46 (Supplement): 301611 (October 2023)Vision: An empirical framework for examiners to accessing password-protected resources for on-the-scene digital investigations., , and . Digit. Investig., 40 (Supplement): 301376 (2022)