Secure network architecture L He, B Littlefair, T Martin, D Kallath, C Rutherford US Patent 8,544,081, 2013 | 179 | 2013 |
Forensics data acquisition methods for mobile phones KA Alghafli, A Jones, TA Martin 2012 International Conference for Internet Technology and Secured …, 2012 | 38 | 2012 |
Forensic analysis of the Windows 7 registry KA Alghafli, A Jones, TA Martin School of Computer and Information Science, Edith Cowan University, Perth …, 2010 | 38 | 2010 |
CISRI: A crime investigation system using the relative importance of information spreaders in networks depicting criminals communications M Alzaabi, K Taha, TA Martin IEEE Transactions on Information Forensics and Security 10 (10), 2196-2211, 2015 | 33 | 2015 |
An ontology-based forensic analysis tool M Alzaabi, A Jones, TA Martin | 25 | 2013 |
Experimental proof: Data remanence in cloud vms B Albelooshi, K Salah, T Martin, E Damiani 2015 IEEE 8th International Conference on Cloud Computing, 1017-1020, 2015 | 24 | 2015 |
Assessing the security of the cloud environment E Al Awadhi, K Salah, T Martin 2013 7th IEEE GCC Conference and Exhibition (GCC), 251-256, 2013 | 22 | 2013 |
Securing cryptographic keys in the cloud: A survey B AlBelooshi, E Damiani, K Salah, T Martin IEEE Cloud Computing 3 (4), 42-56, 2016 | 20 | 2016 |
Counter-radicalisation policy and the securing of British identity: The politics of Prevent T Martin Manchester University Press, 2019 | 18 | 2019 |
Guidelines for the digital forensic processing of smartphones KA Alghafli, A Jones, TA Martin secau Security Research Centre, Edith Cowan University, Perth, Western Australia, 2011 | 18 | 2011 |
The 2012 analysis of information remaining on computer hard disks offered for sale on the second hand market in the UAE A Jones, T Martin, M Alzaabi SRI Security Research Institute, Edith Cowan University, Perth, Western …, 2012 | 16* | 2012 |
Method and apparatus for the creation of a self-authenticating document J Duffell, L O'toole, T Martin US Patent 7,757,091, 2010 | 16 | 2010 |
An evaluation of data erasing tools T Martin, A Jones secau Security Research Centre, Edith Cowan University, Perth, Western Australia, 2011 | 13 | 2011 |
Digital forensics and the issues of identity A Jones, T Martin Information security technical report 15 (2), 67-71, 2010 | 13 | 2010 |
Securing cryptographic keys in the IaaS cloud model B AlBelooshi, K Salah, T Martin, E Damiani 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing …, 2015 | 11 | 2015 |
Identification and recovery of video fragments for forensics file carving K Alghafli, T Martin 2016 11th International Conference for Internet Technology and Secured …, 2016 | 10 | 2016 |
The use of ontologies in forensic analysis of smartphone content M Alzaabi, TA Martin, K Taha, A Jones Journal of Digital Forensics, Security and Law 10 (4), 9, 2015 | 10 | 2015 |
Establishing the broadcast efficiency of the subset difference revocation scheme T Martin, KM Martin, P Wild Designs, Codes and Cryptography 51, 315-334, 2009 | 9 | 2009 |
On the security of inclusion or omission of MixColumns in AES cipher K AlMarashda, Y AlSalami, K Salah, T Martin 2011 International Conference for Internet Technology and Secured …, 2011 | 7 | 2011 |
Ensuring anonymity for LBSs in smartphone environment M Alzaabi, CY Yeun, TA Martin Journal of Information Processing Systems 7 (1), 121-136, 2011 | 7 | 2011 |