Forensic investigation of cyberstalking cases using Behavioural Evidence Analysis Submitted by rest1 on Mon, 01/12/2026 - 09:30 Read more about Forensic investigation of cyberstalking cases using Behavioural Evidence Analysis
A Framework for Ethical Decision Making Submitted by rest1 on Mon, 01/12/2026 - 09:30 Read more about A Framework for Ethical Decision Making
Disk Devices and Partitions Submitted by rest1 on Mon, 01/12/2026 - 09:30 Read more about Disk Devices and Partitions
Black hole attack in mobile Ad Hoc networks Submitted by rest1 on Mon, 01/12/2026 - 09:30 Read more about Black hole attack in mobile Ad Hoc networks
Behavioural Evidence Analysis Applied to Digital Forensics: An Empirical Analysis of Child Pornography Cases Using P2P Networks Submitted by rest1 on Mon, 01/12/2026 - 09:30 Read more about Behavioural Evidence Analysis Applied to Digital Forensics: An Empirical Analysis of Child Pornography Cases Using P2P Networks
A hierarchical secure routing protocol against black hole attacks in sensor networks Submitted by rest1 on Mon, 01/12/2026 - 09:30 Read more about A hierarchical secure routing protocol against black hole attacks in sensor networks
Information security management handbook Submitted by rest1 on Mon, 01/12/2026 - 09:30 Read more about Information security management handbook