Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Amazon Alexa APIs as a Source of Digital Evidence., and . Cyber Security, page 1-8. IEEE, (2020)Investigating people: a qualitative analysis of the search behaviours of open-source intelligence analysts., , , and . IIiX, page 175-184. ACM, (2014)OPSEC VS Leaked Credentials: Password reuse in Large-Scale Data Leaks., , , and . CAMAD, page 74-79. IEEE, (2023)PHASER: Perceptual hashing algorithms evaluation and results - An open source forensic framework., , and . Forensic Sci. Int. Digit. Investig., (2024)An Auditable Framework for Evidence Sharing and Management Using Smart Lockers and Distributed Technologies: Law Enforcement Use Case., , , and . BDTA, volume 555 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 156-167. Springer, (2023)Forensic Considerations for the High Efficiency Image File Format (HEIF)., and . Cyber Security, page 1-8. IEEE, (2020)Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach., , , , and . ICISSP, page 289-298. SCITEPRESS, (2020)Hamming distributions of popular perceptual hashing techniques., and . Forensic Sci. Int. Digit. Investig., 44 (Supplement): 301509 (March 2023)Testing And Hardening IoT Devices Against the Mirai Botnet., , , and . Cyber Security, page 1-8. IEEE, (2020)Reducing the Impact of Network Bottlenecks on Remote Contraband Detection., , and . Cyber Security, page 1-7. IEEE, (2018)