Author of the publication

A study of user data integrity during acquisition of Android devices.

, , , , , and . Digit. Investig., 10 (Supplement): S3-S11 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated Inference of Past Action Instances in Digital Investigations., and . CoRR, (2014)Determining Training Needs for Cloud Infrastructure Investigations Using I-STRIDE., , and . ICDF2C, volume 132 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 223-236. Springer, (2013)Multi-Stakeholder Case Prioritization in Digital Investigations.. J. Digit. Forensics Secur. Law, 9 (2): 59-72 (2014)How Businesses Can Speed Up International Cybercrime Investigation.. IEEE Secur. Priv., 15 (2): 102-106 (2017)Evidence identification in IoT networks based on threat assessment., and . Future Gener. Comput. Syst., (2019)Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE., , and . CoRR, (2015)A survey of mutual legal assistance involving digital evidence., and . Digital Investigation, (2016)Decision-theoretic file carving., and . Digital Investigation, (2017)A study of user data integrity during acquisition of Android devices., , , , , and . Digit. Investig., 10 (Supplement): S3-S11 (2013)Development and Initial User Evaluation of a Virtual Crime Scene Simulator Including Digital Evidence., , and . ICDF2C, volume 157 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 16-26. Springer, (2015)