From post

Googling Forensics.

, , и . Australian Computer, Network & Information Forensics Conference, стр. 62-67. School of Computer and Information Science, Edith Cowan University, Western Australia, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Privacy-Encoding Models for Preserving Utility of Machine Learning Algorithms in Social Media., , и . TrustCom, стр. 856-863. IEEE, (2020)Assessment of Cyber Security Implications of New Technology Integrations into Military Supply Chains., и . SP (Workshops), стр. 128-135. IEEE, (2020)Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey., , , , и . ACM Comput. Surv., 55 (9): 191:1-191:43 (2023)A Preliminary Approach to the Forensic Analysis of an Ultraportable ASUS Eee PC., , и . e-Forensics, том 8 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 116-121. Springer, (2009)Googling Forensics., , и . Australian Computer, Network & Information Forensics Conference, стр. 62-67. School of Computer and Information Science, Edith Cowan University, Western Australia, (2005)Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics., и . ARES, стр. 1355-1360. IEEE Computer Society, (2008)Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis., , и . ARES, стр. 1361-1368. IEEE Computer Society, (2008)Enhancing Computer Forensics Investigation through Visualisation and Data Exploitation., и . ARES, стр. 1012-1017. IEEE Computer Society, (2009)A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions., , и . IEEE Access, (2020)Visual analytics for cyber red teaming., , и . VizSEC, стр. 1-8. IEEE Computer Society, (2015)