Works matching Computer forensics
1
- International Journal of InformaticsTechnologies, 2016, v. 9, n. 2, p. 137, doi. 10.17671/btd.31631
- ORAKCI, Merve;
- KÖK, İbrahim;
- ÇAKIR, Hüseyin
- Article
2
- International Journal of InformaticsTechnologies, 2012, v. 5, n. 3, p. 29
- ŞİRİKÇİ, Ahmet Serhat;
- CANTÜRK, Nergis
- Article
3
- Journal of Polytechnic, 2021, v. 24, n. 3, p. 1187, doi. 10.2339/politeknik.860163
- ÖNEL, Bünyamin;
- IRMAK, Erdal
- Article
4
- International Journal of Information & Knowledge Management (22318836), 2021, v. 11, n. 1, p. 78
- Yunus, Alwi Mohd;
- Asnawi, Nor Sakila;
- Kadir, Irwan Kamaruddin Abdul
- Article
5
- International Journal of Cloud Applications & Computing, 2011, v. 1, n. 3, p. 22, doi. 10.4018/ijcac.2011070103
- Dahbur, Kamal;
- Mohammad, Bassil
- Article
6
- Applied Sciences (2076-3417), 2024, v. 14, n. 12, p. 5302, doi. 10.3390/app14125302
- González Arias, Rafael;
- Bermejo Higuera, Javier;
- Rainer Granados, J. Javier;
- Bermejo Higuera, Juan Ramón;
- Sicilia Montalvo, Juan Antonio
- Article
7
- Journal of Information Science & Technology, 2008, v. 5, n. 3, p. 43
- Bern, Derek;
- Feld, Francine;
- Huebner, Ewa;
- Bern, Oscar
- Article
8
- Lex Humana, 2024, v. 16, n. 1, p. 156
- AKHTYRSKA, NATALIIA;
- KOSTIUCHENKO, OLENA;
- VYNOHRADOVA, ANNA;
- PAVLYSH, TETIANA;
- BARHAN, SERHII
- Article
9
- Journal of Digital Forensics, Security & Law, 2019, v. 14, n. 1, p. 1
- Seda, Michael A.;
- Kramer, Bonita K.;
- Crumbley, D. Larry
- Article
10
- Journal of Digital Forensics, Security & Law, 2015, v. 10, n. 3, p. 7
- Article
11
- Journal of Digital Forensics, Security & Law, 2014, v. 9, n. 2, p. 51
- Law, Frank;
- Chow, K. P.;
- Mai, Y. H.
- Article
12
- Journal of Digital Forensics, Security & Law, 2013, p. 9
- Yonghao Mai;
- K. P. Chow;
- Rongsheng Xu;
- Gang Zhou;
- Fei Xu;
- Jun Zhang
- Article
13
- Journal of Digital Forensics, Security & Law, 2012, v. 7, n. 2, p. 11
- Article
14
- Journal of Digital Forensics, Security & Law, 2010, v. 5, n. 2, p. 5
- Article
15
- i-Manager's Journal on Software Engineering, 2016, v. 10, n. 4, p. 1, doi. 10.26634/jse.10.4.6056
- RAJESH, K. V. N.;
- RAMESH, K. V. N.
- Article
16
- International Journal of Information & Knowledge Management (22318836), 2024, v. 14, n. 2, p. 127, doi. 10.24191/jikm.v14i2.4474
- Abdullah, Wan Abdul Malek Wan;
- Hussin, Nurussobah;
- Ahmad, Mohd Nazir;
- Samsudin, Ahmad Zam Hariro;
- Jalil, Abdurrahman
- Article
17
- Journal of Information Systems Education, 2010, v. 21, n. 2, p. 195
- Duffy, Kevin P.;
- Davis, Jr., Martin H.;
- Sethi, Vikram
- Article
18
- Communications of the Association for Information Systems, 2008, v. 23, p. 547, doi. 10.17705/1CAIS.02330
- Article
19
- Communications of the Association for Information Systems, 2006, v. 18, p. 2, doi. 10.17705/1CAIS.01810
- Article
20
- International Journal of Information Security & Cybercrime, 2015, v. 4, n. 2, p. 9, doi. 10.19107/IJISC.2015.02.01
- ÇAKIR, Hüseyin;
- KILIÇ, Mehmet Serkan
- Article
21
- Journal of Forensic Studies in Accounting & Business, 2009, v. 1, n. 1, p. 69
- Article
22
- Journal of Computer Information Systems, 2005, v. 46, n. 2, p. 115
- Busing, Michael E.;
- Null, Joshua D.;
- Forcht, Karen A.
- Article
23
- Journal of Information System Security, 2011, v. 7, n. 3, p. 33
- Schmidt, Mark B.;
- Condon, Michael J.
- Article
24
- Multimedia Tools & Applications, 2016, v. 75, n. 16, p. 10097, doi. 10.1007/s11042-015-2798-8
- Wang, Feng;
- Hu, Liang;
- Hu, Jiejun;
- Zhao, Kuo
- Article
25
- Electronics (2079-9292), 2021, v. 10, n. 11, p. 1229, doi. 10.3390/electronics10111229
- Prakash, Vijay;
- Williams, Alex;
- Garg, Lalit;
- Savaglio, Claudio;
- Bawa, Seema
- Article
26
- Information Security Journal: A Global Perspective, 2010, v. 19, n. 3, p. 118, doi. 10.1080/19393550903074135
- Article
27
- Communications of the Association for Information Systems, 2003, v. 12, p. 457, doi. 10.17705/1CAIS.01227
- Article
28
- Revista Científica General José María Córdova, 2021, v. 19, n. 33, p. 181, doi. 10.21830/19006586.726
- Tejo Machado, Nadjila;
- Martinez Basile, Felipe Rodrigues;
- Cezar Amate, Flavio;
- Ramírez López, Leonardo Juan
- Article
29
- Dilemas Contemporáneos: Educación, Política y Valores, 2019, v. 7, p. 1
- Montecé Mosquera, Franklin W.;
- Ochoa Escobar, Laura M.;
- Jordán Cordones, Freddy M.;
- Valencia Vargas, Verónica J.
- Article
30
- Journal of Forensic Sciences, 2016, v. 61, p. S110, doi. 10.1111/1556-4029.12979
- McDown, Robert J.;
- Varol, Cihan;
- Carvajal, Leonardo;
- Chen, Lei
- Article
31
- Information Security Journal: A Global Perspective, 2012, v. 21, n. 3, p. 159, doi. 10.1080/19393555.2011.654317
- Article
32
- Ankara Barosu Dergileri, 2015, v. 73, n. 1, p. 41
- ÖZEN, Muharrem;
- ÖZOCAK, Gürkan
- Article
33
- Journal of Digital Forensics, Security & Law, 2010, v. 5, n. 1, p. 5
- Carlton, Gregory H.;
- Worthley, Reginald
- Article
34
- Journal of Information Science & Technology, 2006, v. 3, n. 1, p. 22
- Bassett, Richard;
- Bass, Linda;
- O'Brien, Paul
- Article
35
- Information Systems Management, 2005, v. 22, n. 2, p. 57, doi. 10.1201/1078/45099.22.2.20050301/87278.7
- Brungs, Angela;
- Jamieson, Rodger
- Article
36
- Journal of Digital Forensics, Security & Law, 2010, v. 5, n. 2, p. 63
- Article
37
- Issues in Informing Science & Information Technology, 2007, v. 4, p. 63, doi. 10.28945/933
- Article
38
- Pakistan Journal of Criminology, 2024, v. 16, n. 2, p. 601, doi. 10.62271/pjc.16.2.601.618
- Yelaiev, Yurii;
- Fedchak, Ihor;
- Senyk, Volodymyr;
- Tymchyshyn, Dmytro;
- Nazarenko, Pavlo
- Article
39
- IT Professional, 2005, v. 7, n. 4, p. 57
- Article
40
- Revista Fatec Zona Sul (REFAS), 2021, v. 7, n. 3, p. 1
- Adolfo Rubio-Rodríguez, Gustavo;
- Guifo Hernández, Heber Alfredo;
- Blandón López, Alexander
- Article
41
- Military Technical Courier / Vojnotehnicki Glasnik, 2013, v. 61, n. 1, p. 136, doi. 10.5937/vojtehg61-1493
- Đokić, Ratomir Đ.;
- Markagić, Milorad S.
- Article
42
- Beyond Limits.... IJAITI: International Journal of Advance Innovations, Thoughts & Ideas, 2012, v. 1, n. 2, p. 1
- Jadhav, D. S.;
- Patil, S. K.
- Article
43
- International Journal of Design, Analysis & Tools for Integrated Circuits & Systems, 2024, v. 13, n. 1, p. 1
- Article
44
- Journal of Digital Forensics, Security & Law, 2021, v. 16, n. 1, p. 1
- Article
45
- Internal Auditor, 2001, v. 58, n. 4, p. 27
- Article
46
- Internal Auditor, 2000, v. 57, n. 1, p. 53
- Article
50
- Forensic Examiner, 2005, v. 14, n. 4, p. 55
- Article