Forensics investigations of multimedia data: A review of the state-of-the-art R Poisel, S Tjoa 2011 sixth international conference on IT security incident management and …, 2011 | 88 | 2011 |
Advanced file carving approaches for multimedia files. R Poisel, S Tjoa, P Tavolato J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2 (4), 42-58, 2011 | 59 | 2011 |
Evidence and Cloud Computing: The Virtual Machine Introspection Approach. R Poisel, E Malzer, S Tjoa J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4 (1), 135-152, 2013 | 56 | 2013 |
A comprehensive literature review of file carving R Poisel, S Tjoa 2013 International conference on availability, reliability and security, 475-484, 2013 | 53 | 2013 |
Facebook watchdog: a research agenda for detecting online grooming and bullying activities M Rybnicek, R Poisel, S Tjoa 2013 IEEE International Conference on Systems, Man, and Cybernetics, 2854-2859, 2013 | 44 | 2013 |
Roadmap to approaches for carving of fragmented multimedia files R Poisel, S Tjoa 2011 Sixth International Conference on Availability, Reliability and …, 2011 | 25 | 2011 |
Discussion on the challenges and opportunities of cloud forensics R Poisel, S Tjoa Multidisciplinary Research and Practice for Information Systems: IFIP WG 8.4 …, 2012 | 24 | 2012 |
A discussion of visualization techniques for the analysis of digital evidence G Schrenk, R Poisel 2011 Sixth International Conference on Availability, Reliability and …, 2011 | 18 | 2011 |
Taxonomy of data fragment classification techniques R Poisel, M Rybnicek, S Tjoa Digital Forensics and Cyber Crime: Fifth International Conference, ICDF2C …, 2014 | 17 | 2014 |
Game-based Simulation of Distributed Denial of Service (DDoS) Attack and Defense Mechanisms of Critical Infrastructures R Poisel, M Rybnicek, S Tjoa IEEE 27th International Conference on Advanced Information Networking and …, 2013 | 15 | 2013 |
A Generic Approach to Critical Infrastructure Modeling and Simulation M Rybnicek, R Poisel, M Ruzicka, S Tjoa 2012 International Conference on Cyber Security, 144-151, 2012 | 8 | 2012 |
Simulation-based cyber-attack assessment of critical infrastructures M Rybnicek, S Tjoa, R Poisel Enterprise and Organizational Modeling and Simulation: 10th International …, 2014 | 7 | 2014 |
Software architecture for real-time steganography in auditive media M Nutzinger, R Poisel 2010 IEEE Region 8 International Conference on Computational Technologies in …, 2010 | 6 | 2010 |
Classification and recovery of fragmented multimedia files using the file carving approach R Poisel, M Rybnicek, B Schildendorfer, S Tjoa International Journal of Mobile Computing and Multimedia Communications …, 2013 | 3 | 2013 |
File System Analysis IE Agiriano, R Poisel | | 2013 |
FORENSISCHE UNTERSCHUNG MULTIMEDIALER DATEN R Poisel, S Tjoa 9. Sicherheitskonferenz Krems, 69, 2011 | | 2011 |
Preparados... listos...¡ Go¡: google inventa un nuevo lenguaje de programación M Nutzinger, R Poisel Linux magazine, 49-54, 2010 | | 2010 |
Didaktische Konzepte für die Lehre zum Thema'Digital Rights Management'an postsekundären Bildungseinrichtungen R Poisel | | 2010 |
Wer spielt, gewinnt M Ruzicka, M Schrattenholzer, M Rybnicek, R Poisel, S Tjoa | | |