default search action
Reza Montasari
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [b2]Reza Montasari:
Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution - Threats, Assessment and Responses. Springer 2024, ISBN 978-3-031-50453-2, pp. 1-270 - 2023
- [b1]Reza Montasari:
Countering Cyberterrorism - The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity. Advances in Information Security 101, Springer 2023, ISBN 978-3-031-21919-1, pp. 1-164 - 2022
- [j11]Fiona Carroll, John Ayooluwa Adejobi, Reza Montasari:
How Good Are We at Detecting a Phishing Attack? Investigating the Evolving Phishing Attack Email and Why It Continues to Successfully Deceive Society. SN Comput. Sci. 3(2): 170 (2022) - 2021
- [j10]Reza Montasari, Stuart Macdonald, Amin Hosseinian Far, Fiona Carroll, Alireza Daneshkhah:
Network and hypervisor-based attacks in cloud computing environments. Int. J. Electron. Secur. Digit. Forensics 13(6): 630-651 (2021) - 2020
- [j9]Reza Montasari, Richard Hill, Simon Parkinson, Alireza Daneshkhah, Amin Hosseinian Far:
Hardware-based cyber threats: attack vectors and defence techniques. Int. J. Electron. Secur. Digit. Forensics 12(4): 397-411 (2020) - [j8]Reza Montasari, Richard Hill, Farshad Montaseri, Hamid Jahankhani, Amin Hosseinian Far:
Internet of things devices: digital forensic process and data reduction. Int. J. Electron. Secur. Digit. Forensics 12(4): 424-436 (2020) - [j7]Reza Montasari, Richard Hill, Simon Parkinson, Pekka Peltola, Amin Hosseinian Far, Alireza Daneshkhah:
Digital Forensics: Challenges and Opportunities for Future Studies. Int. J. Organ. Collect. Intell. 10(2): 37-53 (2020)
2010 – 2019
- 2019
- [j6]Reza Montasari, Victoria Carpenter, Richard Hill:
A road map for digital forensics research: a novel approach for establishing the design science research process in digital forensics. Int. J. Electron. Secur. Digit. Forensics 11(2): 194-224 (2019) - [j5]Reza Montasari, Richard Hill, Amin Hosseinian Far, Farshad Montaseri:
Countermeasures for timing-based side-channel attacks against shared, modern computing hardware. Int. J. Electron. Secur. Digit. Forensics 11(3): 294-320 (2019) - [c5]Reza Montasari, Richard Hill:
Next-Generation Digital Forensics: Challenges and Future Paradigms. ICGS3 2019 - [c4]Pekka Peltola, Reza Montasari, Fernando Seco, Antonio Ramón Jiménez, Richard Hill:
Multi-Platform Architecture for Cooperative Pedestrian Navigation Applications. IPIN 2019: 1-8 - 2018
- [j4]Reza Montasari, Amin Hosseinian Far, Richard Hill, Farshad Montaseri, Mak Sharma, Shahid Shabbir:
Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware? Int. J. Organ. Collect. Intell. 8(2): 32-59 (2018) - 2017
- [j3]Reza Montasari:
A standardised data acquisition process model for digital forensic investigations. Int. J. Inf. Comput. Secur. 9(3): 229-249 (2017) - 2016
- [j2]Reza Montasari:
An ad hoc detailed review of digital forensic investigation process models. Int. J. Electron. Secur. Digit. Forensics 8(3): 205-223 (2016) - [j1]Reza Montasari:
A comprehensive digital forensic investigation process model. Int. J. Electron. Secur. Digit. Forensics 8(4): 285-302 (2016) - [c3]Reza Montasari, Pekka Peltola, Victoria Carpenter:
Gauging the effectiveness of computer misuse act in dealing with cybercrimes. Cyber Security And Protection Of Digital Services 2016: 1-5 - 2015
- [c2]Reza Montasari, Pekka Peltola, David Evans:
Integrated Computer Forensics Investigation Process Model (ICFIPM) for Computer Crime Investigations. ICGS3 2015: 83-95 - [c1]Reza Montasari, Pekka Peltola:
Computer Forensic Analysis of Private Browsing Modes. ICGS3 2015: 96-109
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint