关注
Thomas Martin
Thomas Martin
在 mmu.ac.uk 的电子邮件经过验证
标题
引用次数
引用次数
年份
Secure network architecture
L He, B Littlefair, T Martin, D Kallath, C Rutherford
US Patent 8,544,081, 2013
1792013
Forensics data acquisition methods for mobile phones
KA Alghafli, A Jones, TA Martin
2012 International Conference for Internet Technology and Secured …, 2012
382012
Forensic analysis of the Windows 7 registry
KA Alghafli, A Jones, TA Martin
School of Computer and Information Science, Edith Cowan University, Perth …, 2010
382010
CISRI: A crime investigation system using the relative importance of information spreaders in networks depicting criminals communications
M Alzaabi, K Taha, TA Martin
IEEE Transactions on Information Forensics and Security 10 (10), 2196-2211, 2015
332015
An ontology-based forensic analysis tool
M Alzaabi, A Jones, TA Martin
252013
Experimental proof: Data remanence in cloud vms
B Albelooshi, K Salah, T Martin, E Damiani
2015 IEEE 8th International Conference on Cloud Computing, 1017-1020, 2015
242015
Assessing the security of the cloud environment
E Al Awadhi, K Salah, T Martin
2013 7th IEEE GCC Conference and Exhibition (GCC), 251-256, 2013
222013
Securing cryptographic keys in the cloud: A survey
B AlBelooshi, E Damiani, K Salah, T Martin
IEEE Cloud Computing 3 (4), 42-56, 2016
202016
Counter-radicalisation policy and the securing of British identity: The politics of Prevent
T Martin
Manchester University Press, 2019
182019
Guidelines for the digital forensic processing of smartphones
KA Alghafli, A Jones, TA Martin
secau Security Research Centre, Edith Cowan University, Perth, Western Australia, 2011
182011
The 2012 analysis of information remaining on computer hard disks offered for sale on the second hand market in the UAE
A Jones, T Martin, M Alzaabi
SRI Security Research Institute, Edith Cowan University, Perth, Western …, 2012
16*2012
Method and apparatus for the creation of a self-authenticating document
J Duffell, L O'toole, T Martin
US Patent 7,757,091, 2010
162010
An evaluation of data erasing tools
T Martin, A Jones
secau Security Research Centre, Edith Cowan University, Perth, Western Australia, 2011
132011
Digital forensics and the issues of identity
A Jones, T Martin
Information security technical report 15 (2), 67-71, 2010
132010
Securing cryptographic keys in the IaaS cloud model
B AlBelooshi, K Salah, T Martin, E Damiani
2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing …, 2015
112015
Identification and recovery of video fragments for forensics file carving
K Alghafli, T Martin
2016 11th International Conference for Internet Technology and Secured …, 2016
102016
The use of ontologies in forensic analysis of smartphone content
M Alzaabi, TA Martin, K Taha, A Jones
Journal of Digital Forensics, Security and Law 10 (4), 9, 2015
102015
Establishing the broadcast efficiency of the subset difference revocation scheme
T Martin, KM Martin, P Wild
Designs, Codes and Cryptography 51, 315-334, 2009
92009
On the security of inclusion or omission of MixColumns in AES cipher
K AlMarashda, Y AlSalami, K Salah, T Martin
2011 International Conference for Internet Technology and Secured …, 2011
72011
Ensuring anonymity for LBSs in smartphone environment
M Alzaabi, CY Yeun, TA Martin
Journal of Information Processing Systems 7 (1), 121-136, 2011
72011
系统目前无法执行此操作,请稍后再试。
文章 1–20