Author of the publication

Extracting Suspicious IP Addresses from WhatsApp Network Traffic in Cybercrime Investigations.

, , and . ICACT, page 1108-1115. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Internet forensics on the basis of evidence gathering with Peep attacks., and . Comput. Stand. Interfaces, 29 (4): 423-429 (2007)Exploring drug-related crimes with social network analysis., , , and . KES, volume 159 of Procedia Computer Science, page 1907-1917. Elsevier, (2019)The Proposed PDCA Model to Counter Money Laundering., , and . KES, volume 207 of Procedia Computer Science, page 2454-2463. Elsevier, (2022)ATM Heist Threats: A Proposed ICT Governance Strategy.. ICACT, page 610-615. IEEE, (2019)Digitized Forensic Investigation at P2P Copyright Controversy, Infringement., , and . ISI, volume 3975 of Lecture Notes in Computer Science, page 644-646. Springer, (2006)Ön the left side, there's nothing right. On the right side, there's nothing left: " Polarization of Political Opinion by News Media., , , , and . iConference, volume 12051 of Lecture Notes in Computer Science, page 209-219. Springer, (2020)Privacy Concealments: Detective Strategies Unveiling Cyberstalking on Internet., , , , and . APSCC, page 1364-1368. IEEE Computer Society, (2008)The Cyberbullying Assessment of Capable Guardianship in Routine Activity Theory., , and . PAISI, volume 10241 of Lecture Notes in Computer Science, page 3-14. (2017)The IP address and time in cyber-crime investigation, and . Policing: An International Journal of Police Strategies & Management, 32 (2): 194-208 (2009)Frameworks in Evidence Collection in Forensics by Analyzing Temporal Cloud Storage Forensics., , and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 904-913. IOS Press, (2014)