Forensic analysis of social networking applications on mobile devices N Al Mutawa, I Baggili, A Marrington Digital Investigation 9, S24-S33, 2012 | 281 | 2012 |
Forensic analysis of private browsing artifacts H Said, N Al Mutawa, I Al Awadhi, M Guimaraes Innovations in information technology (IIT), 2011 International conference …, 2011 | 103 | 2011 |
Forensic artifacts of Facebook's instant messaging service N Al Mutawa, I Al Awadhi, I Baggili, A Marrington Internet Technology and Secured Transactions (ICITST), 2011 International …, 2011 | 74 | 2011 |
Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes N Al Mutawa, J Bryce, VNL Franqueira, A Marrington, JC Read Digital Investigation 28, 70-82, 2019 | 54 | 2019 |
Forensic investigation of cyberstalking cases using Behavioural Evidence Analysis N Al Mutawa, J Bryce, VNL Franqueira, A Marrington Digital Investigation 16, S96-S103, 2016 | 44 | 2016 |
Behavioural Evidence Analysis Applied to Digital Forensics: An Empirical Analysis of Child Pornography Cases Using P2P Networks N Al Mutawa, J Bryce, VNL Franqueira, A Marrington Availability, Reliability and Security (ARES), 2015 10th International …, 2015 | 36 | 2015 |
Investigation of Indecent Images of Children cases: Challenges and suggestions collected from the trenches VNL Franqueira, J Bryce, N Al Mutawa, A Marrington Digital Investigation, 2017 | 27 | 2017 |
Forensics and war-driving on unsecured wireless network H Said, M Guimaraes, N Al Mutawa, I Al Awadhi Internet Technology and Secured Transactions (ICITST), 2011 International …, 2011 | 17 | 2011 |
Integrating Behavioural Analysis within the Digital Forensics Investigation Process NAK Al Mutawa University of Central Lancashire, 2018 | 1 | 2018 |