Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Inequality-Based Fragmented File Carving Technique., and . e-Forensics, volume 56 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 28-39. Springer, (2010)Accurate in-network file-type classification., , and . SG-CRC, volume 14 of Cryptology and Information Security Series, page 139-146. IOS Press, (2016)A Deep Convolutional Neural Network for Anomalous Online Forum Incident Classification., and . SG-CRC, volume 15 of Cryptology and Information Security Series, page 57-69. IOS Press, (2017)Opportunistic Piggyback Marking for IP Traceback., , , and . IEEE Trans. Inf. Forensics Secur., 11 (2): 273-288 (2016)Malicious Lateral Movement in 5G Core With Network Slicing And Its Detection., and . ITNAC, page 110-117. IEEE, (2023)A Generalized Links and Text Properties Based Forum Crawler., , and . Web Intelligence, page 113-120. IEEE Computer Society, (2012)Design of a Digital Forensics Evidence Reconstruction System for Complex and Obscure Fragmented File Carving., , and . CIS, page 793-797. IEEE Computer Society, (2011)Using Low Level Gradient Channels for Computationally Efficient Object Detection and Its Application in Logo Detection., and . ISM, page 229-232. IEEE Computer Society, (2012)An Improved Double Compression Detection Method for JPEG Image Forensics., , and . ISM, page 290-297. IEEE Computer Society, (2012)Privacy preserving layer partitioning for Deep Neural Network models., , , and . CoRR, (2024)