Author of the publication

Exploring Cyber Investigators: An In-Depth Examination of the Field of Digital Forensics.

, , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 84-88. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cybers Security Analysis and Measurement Tools Using Machine Learning Approach., , , , , and . ICAIC, page 1-4. IEEE, (2022)Mechanisms for Protecting Information in E-Government., , , , and . ICCR, page 1-5. IEEE, (2024)Blockchain and its Integration with IoT Security., , , , and . ICCR, page 1-4. IEEE, (2024)Resource discovery and distributed computing over peer-to-peer networks.. Bangor University, UK, (2005)British Library, EThOS.Securing Smart Cities Using Blockchain Technology., , , , , , , and . ICAIC, page 1-4. IEEE, (2022)Exploring Cyber Investigators: An In-Depth Examination of the Field of Digital Forensics., , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 84-88. IEEE, (2023)Review of Fundamental, Security, and Privacy in Metaverse., , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 408-414. IEEE, (2023)Intelligence Skin Cancer Detection using IoT with a Fuzzy Expert System., , , , , and . ICCR, page 1-6. IEEE, (2022)The Blackboard Resource Discovery Mechanism for Distributed Computing Over Peer-to-Peer Networks., and . Parallel and Distributed Computing and Networks, page 289-294. IASTED/ACTA Press, (2005)Revolutionizing Human Assessment: AI-Driven Analysis of SQ, EQ, and IQ., , , and . ICCR, page 1-7. IEEE, (2024)