Ben Martini

According to our database1, Ben Martini authored at least 36 papers between 2012 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Information Disclosure in Mobile Device: Examining the Influence of Information Relevance and Recipient.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

2019
The role of the adversary model in applied security research.
Comput. Secur., 2019

2018
Ubuntu One Investigation: Detecting Evidences on Client Machines.
CoRR, 2018

Cyber-physical systems information gathering: A smart home case study.
Comput. Networks, 2018

Event Reconstruction of Indonesian E-Banking Services on Windows Phone Devices.
Proceedings of the Security and Privacy in Communication Networks, 2018

An Approach to Enhance Understanding of Digital Forensics Technical Terms in the Presentation Phase of a Digital Investigation Using Multimedia Presentations.
Proceedings of the Security and Privacy in Communication Networks, 2018

2017
Is the data on your wearable device secure? An Android Wear smartwatch case study.
Softw. Pract. Exp., 2017

Forensic data acquisition from cloud-of-things devices: windows Smartphones as a case study.
Concurr. Comput. Pract. Exp., 2017

Forensic Visualization: Survey and Future Research Directions.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

2016
A Data Exfiltration and Remote Exploitation Attack on Consumer 3D Printers.
IEEE Trans. Inf. Forensics Secur., 2016

Cloud forensics: State-of-the-art and future directions.
Digit. Investig., 2016

Cloud Manufacturing: Security, Privacy, and Forensic Concerns.
IEEE Cloud Comput., 2016

Using Multimedia Presentations to Enhance the Judiciary's Technical Understanding of Digital Forensic Concepts: An Indonesian Case Study.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

2015
Mobile Cloud Forensics: An Analysis of Seven Popular Android Apps.
CoRR, 2015

Conceptual evidence collection and analysis methodology for Android devices.
CoRR, 2015

A Forensically Sound Adversary Model for Mobile Devices.
CoRR, 2015

Exfiltrating data from Android devices.
Comput. Secur., 2015

A Cloud-Focused Mobile Forensics Methodology.
IEEE Cloud Comput., 2015

A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Android Cache Taxonomy and Forensic Process.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Privacy Risks in Mobile Dating Apps.
Proceedings of the 21st Americas Conference on Information Systems, 2015

Using Multimedia Presentations to Improve Digital Forensic Understanding: A Pilot Study.
Proceedings of the Australasian Conference on Information Systems, 2015

Ubuntu One investigation: Detecting evidences on client machines.
Proceedings of the Cloud Security Ecosystem, 2015

Mobile cloud forensics: An analysis of seven popular Android apps.
Proceedings of the Cloud Security Ecosystem, 2015

Conceptual evidence collection and analysis methodology for Android devices.
Proceedings of the Cloud Security Ecosystem, 2015

2014
Distributed filesystem forensics: XtreemFS as a case study.
Digit. Investig., 2014

Cloud Forensic Technical Challenges and Solutions: A Snapshot.
IEEE Cloud Comput., 2014

Remote Programmatic vCloud Forensics: A Six-Step Collection Process and a Proof of Concept.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Enforcing File System Permissions on Android External Storage: Android File System Permissions (AFP) Prototype and ownCloud.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Windows Event Forensic Process.
Proceedings of the Advances in Digital Forensics X, 2014

Enhancing User Privacy on Android Mobile Devices via Permissions Removal.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

Building the Next Generation of Cyber Security Professionals.
Proceedings of the 22st European Conference on Information Systems, 2014

Cloud Storage Forensics.
Syngress Publishing / Elsevier, ISBN: 978-0-12-419970-5, 2014

2013
Cloud storage forensics: ownCloud as a case study.
Digit. Investig., 2013

Cloud computing and its implications for cybercrime investigations in Australia.
Comput. Law Secur. Rev., 2013

2012
An integrated conceptual digital forensic framework for cloud computing.
Digit. Investig., 2012


  Loading...