| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2015 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2014 | J | jnl |
Comput. Secur.
|
| 2013 | J | jnl |
J. Digit. Forensics Secur. Law
|
| 2013 | J | jnl |
J. Digit. Forensics Secur. Law
|
| 2012 | J | jnl |
J. Digit. Forensics Secur. Law
|
| 2012 | J | jnl |
J. Digit. Forensics Secur. Law
|
| 2012 | J | jnl |
Column: The Science of Digital Forensics: Recovery of Data from Overwritten Areas of Magnetic Media.
J. Digit. Forensics Secur. Law
|
| 2012 | — | conf |
IEEE Symposium on Security and Privacy Workshops
|
| 2012 | J | jnl |
J. Digit. Forensics Secur. Law
|
| 2011 | J | jnl |
J. Digit. Forensics Secur. Law
|
| 2011 | J | jnl |
J. Digit. Forensics Secur. Law
|
| 2011 | J | jnl |
J. Digit. Forensics Secur. Law
|
| 2010 | J | jnl |
Comput. Secur.
|
| 2010 | J | jnl |
IEEE Secur. Priv.
|
| 2010 | — | conf |
SADFE
|
| 2010 | J | jnl |
IEEE Secur. Priv.
|
| 2010 | J | jnl |
IEEE Secur. Priv.
|
| 2010 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2010 | J | jnl |
Int. J. Crit. Infrastructure Prot.
|
| 2009 | — | conf |
COMPSAC (2)
|
| 2009 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2009 | — | conf |
SADFE
|
| 2003 | J | jnl |
Comput. Secur.
|
| 2001 | J | jnl |
Comput. J.
|
| 2000 | J | jnl |
Comput. Secur.
|
| 1999 | J | jnl |
Comput. Secur.
|
| 1998 | J | jnl |
Comput. Secur.
|
| 1998 | J | jnl |
Comput. Secur.
|
| 1997 | J | jnl |
Comput. Secur.
|
| 1997 | J | jnl |
Comput. Secur.
|
| 1989 | J | jnl |
Comput. Secur.
|
| 1989 | J | jnl |
Comput. Secur.
|
| 1988 | J | jnl |
Comput. Secur.
|
| 1988 | J | jnl |
Comput. Secur.
|
| 1988 | J | jnl |
Comput. Secur.
|
| 1988 | J | jnl |
Comput. Secur.
|
| 1988 | J | jnl |
Comput. Secur.
|
| 1987 | J | jnl |
Comput. Secur.
|
| 1987 | J | jnl |
Comput. Secur.
|
| 1987 | J | jnl |
Comput. Secur.
|
| 1987 | J | jnl |
Comput. Secur.
|
| 1987 | J | jnl |
Comput. Secur.
|
| 1985 | J | jnl |
Comput. Secur.
|