Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tiered Forensic Methodology Model for Digital Field Triage by Non-Digital Evidence Specialists., , and . CoRR, (2016)Grid-based Approaches for Distributed Data Mining Applications., , and . CoRR, (2017)Designing Hybrid Cloud Computing Framework using OpenStack for Supporting Multimedia with Security and Privacy., , , and . MobiMedia, page 184-189. ACM, (2016)Variance-based Clustering Technique for Distributed Data Mining Applications., , and . DMIN, page 111-117. CSREA Press, (2007)One-class Collective Anomaly Detection based on Long Short-Term Memory Recurrent Neural Networks., , and . CoRR, (2018)Shining a light on Spotlight: Leveraging Apple's desktop search utility to recover deleted file metadata on macOS., , and . CoRR, (2019)Identifying interception possibilities for WhatsApp communication., and . CoRR, (2020)A comparative study of support vector machine and neural networks for file type identification using n-gram analysis., , , and . Digit. Investig., (2021)An Automated Live Forensic and Postmortem Analysis Tool for Bitcoin on Windows Systems., , and . IEEE Access, (2019)Ontology Based Approach for Precision Agriculture., , and . MIWAI, volume 11248 of Lecture Notes in Computer Science, page 175-186. Springer, (2018)