Author of the publication

Forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications.

, , , , and . Ann. des Télécommunications, 78 (3-4): 183-208 (April 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications., , , , and . Ann. des Télécommunications, 78 (3-4): 183-208 (April 2023)Security Assessment for Zenbo Robot Using Drozer and mobSF Frameworks., , , , and . NTMS, page 1-7. IEEE, (2021)Forensic Analysis of the Cisco WebEx Application., , , , and . CSNet, page 90-97. IEEE, (2021)Random fixed point theorems for composites of acyclic multifunctions. Stochastic Analysis and Applications, 19 (6): 925--931 (2001)WhatsApp Network Forensics: Discovering the IP Addresses of Suspects., , , , and . NTMS, page 1-7. IEEE, (2021)A Server Based ASR Approach to Automated Cryptanalysis of Two Time Pads in Case of Speech., and . IAS, page 103-107. IEEE Computer Society, (2008)SeFACED: Semantic-Based Forensic Analysis and Classification of E-Mail Data Using Deep Learning., , , , , and . IEEE Access, (2021)Exploiting Silence for Ciphertext Only Cryptanalysis of Stream Ciphered Digitized Voice., , and . Security and Management, page 157-164. CSREA Press, (2007)Random fixed point theorems for multivalued acyclic random maps, and . Stochastic Analysis and Applications, 17 (5): 835--840 (1999)Leveraging the Internet of Things for Smart Waters: Motivation, Enabling Technologies and Deployment Strategies for Pakistan., , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 2117-2124. IEEE, (2018)