Author of the publication

Exploring Cyber Investigators: An In-Depth Examination of the Field of Digital Forensics.

, , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 84-88. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing Smart Cities Using Blockchain Technology., , , , , , , and . ICAIC, page 1-4. IEEE, (2022)Resource discovery and distributed computing over peer-to-peer networks.. Bangor University, UK, (2005)British Library, EThOS.Exploring Cyber Investigators: An In-Depth Examination of the Field of Digital Forensics., , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 84-88. IEEE, (2023)Review of Fundamental, Security, and Privacy in Metaverse., , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 408-414. IEEE, (2023)DDoS Intrusion Detection with Ensemble Stream Mining for IoT Smart Sensing Devices., , , , , , , , , and 1 other author(s). The Effect of Information Technology on Business and Marketing Intelligence Systems, volume 1056 of Studies in Computational Intelligence, Springer, (2023)Intelligence Skin Cancer Detection using IoT with a Fuzzy Expert System., , , , , and . ICCR, page 1-6. IEEE, (2022)Breast Cancer Prediction Using Machine Learning and Image Processing Optimization., , , , and . The Effect of Information Technology on Business and Marketing Intelligence Systems, volume 1056 of Studies in Computational Intelligence, Springer, (2023)Cybers Security Analysis and Measurement Tools Using Machine Learning Approach., , , , , and . ICAIC, page 1-4. IEEE, (2022)Mechanisms for Protecting Information in E-Government., , , , and . ICCR, page 1-5. IEEE, (2024)Blockchain and its Integration with IoT Security., , , , and . ICCR, page 1-4. IEEE, (2024)