Search

Your search keyword '"Saleem, Shahzad"' showing total 35 results

Search Constraints

Start Over You searched for: Author "Saleem, Shahzad" Remove constraint Author: "Saleem, Shahzad" Database OAIster Remove constraint Database: OAIster
35 results on '"Saleem, Shahzad"'

Search Results

1. DroidMorph: Are We Ready to Stop the Attack of Android Malware Clones?

2. Behavior of PET FRP-confined plain and reinforced concrete under compression

3. Behavior of PET FRP-confined plain and reinforced concrete under compression

4. Behavior of PET FRP-confined plain and reinforced concrete under compression

5. Behavior of PET FRP-confined plain and reinforced concrete under compression

6. Protecting Digital Evidence Integrity and Preserving Chain of Custody

7. Behavior of PET FRP-confined plain and reinforced concrete under compression

8. A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis

9. Protecting the Integrity of Digital Evidence and Basic Human Rights During the Process of Digital Forensics

10. Protecting the Integrity of Digital Evidence and Basic Human Rights During the Process of Digital Forensics

11. Protecting the Integrity of Digital Evidence and Basic Human Rights During the Process of Digital Forensics

12. Protecting the Integrity of Digital Evidence and Basic Human Rights During the Process of Digital Forensics

13. Protecting the Integrity of Digital Evidence and Basic Human Rights During the Process of Digital Forensics

14. Protecting the Integrity of Digital Evidence and Basic Human Rights During the Process of Digital Forensics

15. Quantifying relevance of mobile digital evidence as they relate to case types : a survey and a guide for best practices

16. Testing Framework for Mobile Device Forensics Tools

17. Extended Abstract Digital Forensics Model with Preservation and Protection as Umbrella Principles

18. Quantifying Relevance of Mobile Digital Evidence as They Relate to Case Types: A Survey and a Guide for Best Practice

19. Testing Framework for Mobile Device Forensics Tools

20. Formal Approach for the Selection of a Right Tool for Mobile Device Forensics

21. Evaluating and Comparing Tools for Mobile Device Forensics Using Quantitative Analysis

23. Evaluation of Security Methods for Ensuring the Integrity of Digital Evidence

24. Evaluation of Some Tools for Extracting e-Evidence from Mobile Devices

25. Evaluation of Security Methods for Ensuring the Integrity of Digital Evidence

26. Evaluation of Some Tools for Extracting e-Evidence from Mobile Devices

27. Evaluation of Security Methods for Ensuring the Integrity of Digital Evidence

28. Evaluation of Some Tools for Extracting e-Evidence from Mobile Devices

29. Evaluation of Security Methods for Ensuring the Integrity of Digital Evidence

30. Evaluation of Some Tools for Extracting e-Evidence from Mobile Devices

31. Evaluation of Security Methods for Ensuring the Integrity of Digital Evidence

32. Evaluation of Some Tools for Extracting e-Evidence from Mobile Devices

33. Evaluation of Security Methods for Ensuring the Integrity of Digital Evidence

34. Evaluation of Some Tools for Extracting e-Evidence from Mobile Devices

35. Protecting Digital Evidence Integrity by Using Smart Cards : Revised Selected Papers

Catalog

Books, media, physical & digital resources