Reza Montasari

Orcid: 0000-0001-7136-6753

According to our database1, Reza Montasari authored at least 18 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution - Threats, Assessment and Responses
Springer, ISBN: 978-3-031-50453-2, 2024

2023
Countering Cyberterrorism - The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity
Advances in Information Security 101, Springer, ISBN: 978-3-031-21919-1, 2023

2022
How Good Are We at Detecting a Phishing Attack? Investigating the Evolving Phishing Attack Email and Why It Continues to Successfully Deceive Society.
SN Comput. Sci., 2022

2021
Network and hypervisor-based attacks in cloud computing environments.
Int. J. Electron. Secur. Digit. Forensics, 2021

2020
Digital Forensics: Challenges and Opportunities for Future Studies.
Int. J. Organ. Collect. Intell., 2020

Hardware-based cyber threats: attack vectors and defence techniques.
Int. J. Electron. Secur. Digit. Forensics, 2020

Internet of things devices: digital forensic process and data reduction.
Int. J. Electron. Secur. Digit. Forensics, 2020

2019
Countermeasures for timing-based side-channel attacks against shared, modern computing hardware.
Int. J. Electron. Secur. Digit. Forensics, 2019

A road map for digital forensics research: a novel approach for establishing the design science research process in digital forensics.
Int. J. Electron. Secur. Digit. Forensics, 2019

Multi-Platform Architecture for Cooperative Pedestrian Navigation Applications.
Proceedings of the 2019 International Conference on Indoor Positioning and Indoor Navigation, 2019

Next-Generation Digital Forensics: Challenges and Future Paradigms.
Proceedings of the 12th IEEE International Conference on Global Security, 2019

2018
Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware?
Int. J. Organ. Collect. Intell., 2018

2017
A standardised data acquisition process model for digital forensic investigations.
Int. J. Inf. Comput. Secur., 2017

2016
A comprehensive digital forensic investigation process model.
Int. J. Electron. Secur. Digit. Forensics, 2016

An ad hoc detailed review of digital forensic investigation process models.
Int. J. Electron. Secur. Digit. Forensics, 2016

Gauging the effectiveness of computer misuse act in dealing with cybercrimes.
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016

2015
Integrated Computer Forensics Investigation Process Model (ICFIPM) for Computer Crime Investigations.
Proceedings of the Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security, 2015

Computer Forensic Analysis of Private Browsing Modes.
Proceedings of the Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security, 2015


  Loading...