Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/icgs3/MontasariPE15
%A Montasari, Reza
%A Peltola, Pekka
%A Evans, David
%B ICGS3
%D 2015
%E Jahankhani, Hamid
%E Carlile, Alex
%E Akhgar, Babak
%E Taal, Amie
%E Hessami, Ali G.
%E Far, Amin Hosseinian
%I Springer
%K dblp
%P 83-95
%T Integrated Computer Forensics Investigation Process Model (ICFIPM) for Computer Crime Investigations.
%U http://dblp.uni-trier.de/db/conf/icgs3/icgs3-2015.html#MontasariPE15
%V 534
%@ 978-3-319-23275-1
@inproceedings{conf/icgs3/MontasariPE15,
added-at = {2020-09-05T00:00:00.000+0200},
author = {Montasari, Reza and Peltola, Pekka and Evans, David},
biburl = {https://www.bibsonomy.org/bibtex/2f4f288c7420e815ca234632a15021b5a/dblp},
booktitle = {ICGS3},
crossref = {conf/icgs3/2015},
editor = {Jahankhani, Hamid and Carlile, Alex and Akhgar, Babak and Taal, Amie and Hessami, Ali G. and Far, Amin Hosseinian},
ee = {https://doi.org/10.1007/978-3-319-23276-8_8},
interhash = {389e2b963c547e2de41e21ee80e7171f},
intrahash = {f4f288c7420e815ca234632a15021b5a},
isbn = {978-3-319-23275-1},
keywords = {dblp},
pages = {83-95},
publisher = {Springer},
series = {Communications in Computer and Information Science},
timestamp = {2020-09-09T15:13:18.000+0200},
title = {Integrated Computer Forensics Investigation Process Model (ICFIPM) for Computer Crime Investigations.},
url = {http://dblp.uni-trier.de/db/conf/icgs3/icgs3-2015.html#MontasariPE15},
volume = 534,
year = 2015
}