From post

A Comparison Study of Android Mobile Forensics for Retrieving Files System

, и . International Journal of Computer Science and Security (IJCSS), 13 (4): 148 - 166 (августа 2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A taxonomy of electronic cash schemes., , , и . SEC, том 92 из IFIP Conference Proceedings, стр. 337-348. Chapman & Hall, (1997)Off-Line Fair Payment Protocols Using Convertible Signatures., и . ASIACRYPT, том 1514 из Lecture Notes in Computer Science, стр. 271-285. Springer, (1998)Internet-wide Scanning Taxonomy and Framework., , и . AISC, том 161 из CRPIT, стр. 61-65. Australian Computer Society, (2015)Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining., , , и . NSS, том 9955 из Lecture Notes in Computer Science, стр. 499-506. Springer, (2016)Encrypted Network Traffic Classification with Higher Order Graph Neural Network., , , , и . ACISP, том 13915 из Lecture Notes in Computer Science, стр. 630-650. Springer, (2023)A CNN Based Encrypted Network Traffic Classifier., , , и . ACSW, стр. 74-83. ACM, (2022)A Digital Twin Runtime Verification Framework for Protecting Satellites Systems from Cyber Attacks., , , , и . ICECCS, стр. 117-122. IEEE, (2022)Modeling for performance and security balanced trading communication systems in the cloud., , , и . IPCCC, стр. 1-7. IEEE Computer Society, (2017)Process Discovery for Industrial Control System Cyber Attack Detection., , , и . SEC, том 502 из IFIP Advances in Information and Communication Technology, стр. 61-75. Springer, (2017)QoE Estimation Model for a Secure Real-Time Voice Communication System in the Cloud., , , и . ACSW, стр. 10:1-10:9. ACM, (2019)