Login / Signup

Suspects' data hiding at remaining registry values of uninstalled programs.

Young-Soo KimSang-Su LeeDowon Hong
Published in: e-Forensics (2008)
Keyphrases