Author:
Zhang Xiaolu,Yuen Timothy T.,Choo Kim-Kwang Raymond
Publisher
Springer International Publishing
Reference32 articles.
1. Ahsan, M.M., Wahab, A.W.A., Idris, M.Y.I., Khan, S., Bachura, E., Choo, K.-K.R.: Class: cloud log assuring soundness and secrecy scheme for cloud forensics. IEEE Trans. Sustain. Comput. (2018)
2. Barmpatsalou, K., Cruz, T., Monteiro, E., Simões, P.: Current and future trends in mobile device forensics: a survey. ACM Comput. Surv. 51(3), 46:1–46:31 (2018).
https://doi.org/10.1145/3177847
3. Cloyd, T., Osborn, T., Ellingboe, B., Glisson, W.B., Choo, K.R.: Browser analysis of residual facebook data. In: 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering, Trustcom/Bigdatase 2018, New York, NY, USA, 1–3 August 2018, pp. 1440–1445 (2018).
https://doi.org/10.1109/Trust-Com/BigDataSE.2018.00200
4. Coker, J.S., Heiser, E., Taylor, L., Book, C.: Impacts of experiential learning depth and breadth on student outcomes. J. Exp. Educ. 40(1), 5–23 (2017)
5. DOrazio, C., Ariffin, A., Choo, K.-K.R.: IoS anti-forensics: how can we securely conceal, delete and insert data? In: 2014 47th Hawaii International Conference on System Sciences, pp. 4838–4847 (2014)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献