Your selections:
Analysis of firewall log-based detection scenarios for evidence in digital forensics
- Mukhtar, Rubiu, Al-Nemrat, Ameer, Alazab, Mamoun, Venkatraman, Sitalakshmi, Jahankhani, Hamid
Identity crime : The challenges in the regulation of identity crime
Are you sure you would like to clear your session, including search history and login status?