Author of the publication

The Impact of Hard Disk Firmware Steganography on Computer Forensics.

, , , and . J. Digit. Forensics Secur. Law, 4 (2): 73-84 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Conflict Detection for Integration of Taxonomic Data Sources., , , , , , , and . SSDBM, page 204-213. IEEE Computer Society, (1999)LITCHI: Knowledge Integrity Testing for Taxonomic Databases., , , , , , , and . SSDBM, page 278. IEEE Computer Society, (1999)A Unified Approach to Network Traffic and Network Security Visualisation., , and . ICC, page 1-6. IEEE, (2009)Nintendo 3DS Forensic Examination Tools., , , , and . IFIP Int. Conf. Digital Forensics, volume 687 of IFIP Advances in Information and Communication Technology, page 55-70. Springer, (2023)Forensic Analysis of the Nintendo 3DS NAND., , , and . Digit. Investig., (2019)A Forensic Methodology for Analyzing Nintendo 3DS Devices., , , , and . IFIP Int. Conf. Digital Forensics, volume 484 of IFIP Advances in Information and Communication Technology, page 127-143. Springer, (2016)Analysis of Information Remaining on Hand Held Devices Offered for Sale on the Second Hand Market., , and . J. Digit. Forensics Secur. Law, 3 (2): 55-70 (2008)XEON - An Architecture for an XML Enabled Firewall., , and . ICEIS, page 1111-1116. (2002)Forensic Evaluation of an Amazon Fire TV Stick., , , and . IFIP Int. Conf. Digital Forensics, volume 511 of IFIP Advances in Information and Communication Technology, page 63-79. Springer, (2017)Network Attack Analysis and the Behaviour Engine., , and . AINA, page 106-113. IEEE Computer Society, (2013)