1. On the completeness of reconstructed data for database forensics;Adedayo,2012
2. Towards blockchain-driven, secure and transparent audit logs;Ahmad,2018
3. Hardlog: practical tamper-proof system auditing using a novel audit device;Ahmad,2022
4. Detecting objective-c malware through memory forensics;Case;Digit. Invest.,2016
5. Memory forensics: the path forward;Case;Digit. Invest.,2017