Author of the publication

3LSPG: Forensic Tool Evaluation by Three Layer Stochastic Process-Based Generation of Data

, , , and . book series publisher, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Acquisition on a Large Darknet Marketplace., , and . ARES, page 53:1-53:6. ACM, (2022)Detection and Analysis of Tor Onion Services., , , , and . ARES, page 66:1-66:10. ACM, (2019)3LSPG: Forensic Tool Evaluation by Three Layer Stochastic Process-Based Generation of Data, , , and . book series publisher, (2011)exHide: Hiding Data within the exFAT File System., , and . ARES, page 77:1-77:8. ACM, (2021)Detecting Fraud Using Modified Benford Analysis., , and . IFIP Int. Conf. Digital Forensics, volume 361 of IFIP Advances in Information and Communication Technology, page 129-141. Springer, (2011)An Analysis Framework for Product Prices and Supplies in Darknet Marketplaces., , and . ARES, page 50:1-50:7. ACM, (2019)Trust Assessment of a Darknet Marketplace., and . TrustCom, page 1806-1813. IEEE, (2023)Recognition of objects from looted excavations by smartphone app and deep learning., , , , , , , and . MOBMU, page 1-4. Society for Imaging Science and Technology, (2022)Comparison of Cyber Attacks on Services in the Clearnet and Darknet., , and . IFIP Int. Conf. Digital Forensics, volume 612 of IFIP Advances in Information and Communication Technology, page 39-61. Springer, (2021)Using Approximate Matching to Reduce the Volume of Digital Data., , , , and . IFIP Int. Conf. Digital Forensics, volume 433 of IFIP Advances in Information and Communication Technology, page 149-163. Springer, (2014)