default search action
Ben Martini
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c13]Ming Di Leom, Gaye Deegan, Ben Martini, John Boland:
Information Disclosure in Mobile Device: Examining the Influence of Information Relevance and Recipient. HICSS 2021: 1-9
2010 – 2019
- 2019
- [j14]Quang Do, Ben Martini, Kim-Kwang Raymond Choo:
The role of the adversary model in applied security research. Comput. Secur. 81: 156-181 (2019) - 2018
- [j13]Quang Do, Ben Martini, Kim-Kwang Raymond Choo:
Cyber-physical systems information gathering: A smart home case study. Comput. Networks 138: 1-12 (2018) - [c12]Niken Dwi Wahyu Cahyani, Ben Martini, Kim-Kwang Raymond Choo, Helen Ashman:
An Approach to Enhance Understanding of Digital Forensics Technical Terms in the Presentation Phase of a Digital Investigation Using Multimedia Presentations. SecureComm (2) 2018: 488-506 - [c11]Niken Dwi Wahyu Cahyani, Ben Martini, Kim-Kwang Raymond Choo, Helen Ashman:
Event Reconstruction of Indonesian E-Banking Services on Windows Phone Devices. SecureComm (2) 2018: 507-521 - [i7]Mohammad Shariati, Ali Dehghantanha, Ben Martini, Kim-Kwang Raymond Choo:
Ubuntu One Investigation: Detecting Evidences on Client Machines. CoRR abs/1807.10448 (2018) - [i6]Quang Do, Ben Martini, Kim-Kwang Raymond Choo:
The Role of the Adversary Model in Applied Security Research. IACR Cryptol. ePrint Arch. 2018: 1189 (2018) - 2017
- [j12]Niken Dwi Wahyu Cahyani, Ben Martini, Kim-Kwang Raymond Choo, AKBP Muhammad Nuh Al-Azhar:
Forensic data acquisition from cloud-of-things devices: windows Smartphones as a case study. Concurr. Comput. Pract. Exp. 29(14) (2017) - [j11]Quang Do, Ben Martini, Kim-Kwang Raymond Choo:
Is the data on your wearable device secure? An Android Wear smartwatch case study. Softw. Pract. Exp. 47(3): 391-403 (2017) - [p4]Christopher Tassone, Ben Martini, Kim-Kwang Raymond Choo:
Forensic Visualization: Survey and Future Research Directions. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017: 163-184 - 2016
- [j10]Christian Esposito, Aniello Castiglione, Ben Martini, Kim-Kwang Raymond Choo:
Cloud Manufacturing: Security, Privacy, and Forensic Concerns. IEEE Cloud Comput. 3(4): 16-22 (2016) - [j9]Kim-Kwang Raymond Choo, Martin Herman, Michaela Iorga, Ben Martini:
Cloud forensics: State-of-the-art and future directions. Digit. Investig. 18: 77-78 (2016) - [j8]Quang Do, Ben Martini, Kim-Kwang Raymond Choo:
A Data Exfiltration and Remote Exploitation Attack on Consumer 3D Printers. IEEE Trans. Inf. Forensics Secur. 11(10): 2174-2186 (2016) - [c10]Niken Dwi Wahyu Cahyani, Ben Martini, Kim-Kwang Raymond Choo:
Using Multimedia Presentations to Enhance the Judiciary's Technical Understanding of Digital Forensic Concepts: An Indonesian Case Study. HICSS 2016: 5617-5626 - [i5]Niken Dwi Wahyu Cahyani, Ben Martini, Kim-Kwang Raymond Choo:
Using Multimedia Presentations to Improve Digital Forensic Understanding: A Pilot Study. CoRR abs/1606.01425 (2016) - 2015
- [j7]Quang Do, Ben Martini, Kim-Kwang Raymond Choo:
A Cloud-Focused Mobile Forensics Methodology. IEEE Cloud Comput. 2(4): 60-65 (2015) - [j6]Quang Do, Ben Martini, Kim-Kwang Raymond Choo:
Exfiltrating data from Android devices. Comput. Secur. 48: 74-91 (2015) - [c9]Niken Dwi Wahyu Cahyani, Ben Martini, Kim-Kwang Raymond Choo:
Using Multimedia Presentations to Improve Digital Forensic Understanding: A Pilot Study. ACIS 2015: 40 - [c8]Kim-Kwang Raymond Choo, Jody Farnden, Ben Martini:
Privacy Risks in Mobile Dating Apps. AMCIS 2015 - [c7]Kin Suntana Tep, Ben Martini, Ray Hunt, Kim-Kwang Raymond Choo:
A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management. TrustCom/BigDataSE/ISPA (1) 2015: 1073-1080 - [c6]Felix Immanuel, Ben Martini, Kim-Kwang Raymond Choo:
Android Cache Taxonomy and Forensic Process. TrustCom/BigDataSE/ISPA (1) 2015: 1094-1101 - [p3]Ben Martini, Quang Do, Kim-Kwang Raymond Choo:
Conceptual evidence collection and analysis methodology for Android devices. The Cloud Security Ecosystem 2015: 285-307 - [p2]Ben Martini, Quang Do, Kim-Kwang Raymond Choo:
Mobile cloud forensics: An analysis of seven popular Android apps. The Cloud Security Ecosystem 2015: 309-345 - [p1]Mohammad Shariati, Ali Dehghantanha, Ben Martini, Kim-Kwang Raymond Choo:
Ubuntu One investigation: Detecting evidences on client machines. The Cloud Security Ecosystem 2015: 429-446 - [i4]Jody Farnden, Ben Martini, Kim-Kwang Raymond Choo:
Privacy Risks in Mobile Dating Apps. CoRR abs/1505.02906 (2015) - [i3]Ben Martini, Quang Do, Kim-Kwang Raymond Choo:
Conceptual evidence collection and analysis methodology for Android devices. CoRR abs/1506.05527 (2015) - [i2]Ben Martini, Quang Do, Kim-Kwang Raymond Choo:
Mobile Cloud Forensics: An Analysis of Seven Popular Android Apps. CoRR abs/1506.05533 (2015) - [i1]Quang Do, Ben Martini, Kim-Kwang Raymond Choo:
A Forensically Sound Adversary Model for Mobile Devices. CoRR abs/1509.06815 (2015) - 2014
- [b1]Darren Quick, Ben Martini, Kim-Kwang Raymond Choo:
Cloud Storage Forensics. Syngress Publishing / Elsevier 2014, ISBN 978-0-12-419970-5, pp. I-XVIII, 1-189 - [j5]Ben Martini, Kim-Kwang Raymond Choo:
Cloud Forensic Technical Challenges and Solutions: A Snapshot. IEEE Cloud Comput. 1(4): 20-25 (2014) - [j4]Ben Martini, Kim-Kwang Raymond Choo:
Distributed filesystem forensics: XtreemFS as a case study. Digit. Investig. 11(4): 295-313 (2014) - [c5]Ben Martini, Kim-Kwang Raymond Choo:
Building the Next Generation of Cyber Security Professionals. ECIS 2014 - [c4]Quang Do, Ben Martini, Kim-Kwang Raymond Choo:
Enhancing User Privacy on Android Mobile Devices via Permissions Removal. HICSS 2014: 5070-5079 - [c3]Quang Do, Ben Martini, Jonathan Looi, Yu Wang, Kim-Kwang Raymond Choo:
Windows Event Forensic Process. IFIP Int. Conf. Digital Forensics 2014: 87-100 - [c2]Ben Martini, Kim-Kwang Raymond Choo:
Remote Programmatic vCloud Forensics: A Six-Step Collection Process and a Proof of Concept. TrustCom 2014: 935-942 - [c1]Quang Do, Ben Martini, Kim-Kwang Raymond Choo:
Enforcing File System Permissions on Android External Storage: Android File System Permissions (AFP) Prototype and ownCloud. TrustCom 2014: 949-954 - 2013
- [j3]Christopher Hooper, Ben Martini, Kim-Kwang Raymond Choo:
Cloud computing and its implications for cybercrime investigations in Australia. Comput. Law Secur. Rev. 29(2): 152-163 (2013) - [j2]Ben Martini, Kim-Kwang Raymond Choo:
Cloud storage forensics: ownCloud as a case study. Digit. Investig. 10(4): 287-299 (2013) - 2012
- [j1]Ben Martini, Kim-Kwang Raymond Choo:
An integrated conceptual digital forensic framework for cloud computing. Digit. Investig. 9(2): 71-80 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-02 19:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint