default search action
Michael Losavio
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c25]Michael Losavio:
Identity and Sufficiency of Digital Evidence. IFIP Int. Conf. Digital Forensics 2020: 25-36
2010 – 2019
- 2018
- [j9]Michael Martin Losavio, Kam-Pui Chow, Andras Koltay, Joshua James:
The Internet of Things and the Smart City: Legal challenges with digital forensics, privacy, and security. Secur. Priv. 1(3) (2018) - [c24]Michael Losavio, Adel Elmaghraby, Antonio Losavio:
Ubiquitous Networks, Ubiquitous Sensors: Issues of Security, Reliability and Privacy in the Internet of Things. UNet 2018: 331-343 - 2017
- [j8]Deborah W. Keeling, Michael Losavio:
Public Security & Digital Forensics in the United States: The Continued Need for Expanded Digital Systems for Security. J. Digit. Forensics Secur. Law 12(3): 47-60 (2017) - [j7]Michael Losavio, Adel Elmaghraby:
Security and the Transnational Information Polity. J. Digit. Forensics Secur. Law 12(3): 67-76 (2017) - 2016
- [j6]Hyunin Baek, Michael Losavio, George Higgins:
The Impact of Low Self-Control on Online Harassment: Interaction with Opportunity. J. Digit. Forensics Secur. Law 11(3): 27-42 (2016) - 2015
- [j5]Michael Losavio, Pavel Sysoevich Pastukov, Svetlana Polyakova:
Cyber Black Box/Event Data Recorder: Legal and Ethical Perspectives and Challenges with Digital Forensics. J. Digit. Forensics Secur. Law 10(4): 43-58 (2015) - [c23]Michael Losavio:
Crimes in, of and by virtual worlds and computer gaming. CGAMES 2015: 93-98 - [c22]Michael Losavio, Corinne Rogers, Adel Elmaghraby:
Digital heritage from the Smart City and the Internet of Things: History or stasis? Digital Heritage 2015: 431-434 - 2014
- [j4]Michael Losavio, Deborah W. Keeling:
Evidentiary Power and Propriety of Digital Identifiers and the Impact on Privacy Rights in the United States. J. Digit. Forensics Secur. Law 9(2): 197-204 (2014) - [c21]Joseph D. Losavio, Michael Martin Losavio:
The legal/juridical space of computer games: From intellectual property to intellectual freedom. CGAMES 2014: 1-8 - [c20]Antonio Losavio, Svetlana Polyakova, Theresa Hayden, Michael Losavio:
Linguistic implementations in computer game and virtual world design. CGAMES 2014: 1-4 - 2013
- [c19]Michael Losavio, Deborah W. Keeling:
Legal/forensic concerns in the analysis of digital device hardcopy output. SADFE 2013: 1-5 - 2012
- [j3]Shari Lawrence Pfleeger, Marc Rogers, Masooda N. Bashir, Kelly Caine, Deanna D. Caputo, Michael Losavio, Salvatore J. Stolfo:
Does Profiling Make Us More Secure? IEEE Secur. Priv. 10(4): 10-15 (2012) - 2011
- [c18]Michael Martin Losavio, Musa Hindi, Roman V. Yampolskiy, Deborah Wilson Keeling:
Boundary Conditions for the Digital Forensic Use of Electronic Evidence and The Need for Forensic Counter-Analysis. SADFE 2011: 1-6 - [c17]Michael Martin Losavio, Deborah Wilson Keeling:
Computer Forensics And Electronic Evidence - Failure of Competent Computer Forensic Analysis And Other Computer-Related Acts As Ineffective Assistance Of Counsel. SADFE 2011: 1-6 - [c16]Nan Zhang, Yong Guan, Michael Martin Losavio, Peter J. Vasquez, Robert M. Nissen, Edward B. Talbot, Vassil Roussev:
Practitioners' Challenges Panel: The Challenges and Opportunities of Forensic Investigation over Large Data Sets: Timeliness vs Precision vs Comprehensiveness. SADFE 2011: 1-3 - [r1]Michael Losavio, Adel Elmaghraby, Deborah W. Keeling:
International Issues. Encyclopedia of Information Assurance 2011 - 2010
- [c15]Michael Losavio, J. Eagle Shutt, Deborah W. Keeling:
Positing social and justice models for cyber security. CSIIRW 2010: 78 - [c14]Natalie Armstrong, Michael Losavio, Deborah W. Keeling:
Digital System, Evidence & Forensics Issues in Correctional Environments. SADFE 2010: 141-149 - [p1]Adel Elmaghraby, Deborah W. Keeling, Michael Losavio:
Legal Issues for Research and Practice in Computational Forensics. Handbook of Research on Computational Forensics, Digital Crime, and Investigation 2010: 496-515
2000 – 2009
- 2009
- [c13]Michael Losavio, Olfa Nasraoui, Vincent Thacker, Jeffrey S. Marean, Nick Miles, Roman V. Yampolskiy, Ibrahim N. Imam:
Assessing the Legal Risks in Network Forensic Probing. IFIP Int. Conf. Digital Forensics 2009: 255-266 - [c12]Natalie Armstrong, Michael Losavio, Deborah W. Keeling:
Digital Device & Forensics Concerns in Jails, Prisons and Supervisory Environments. SADFE 2009: 34-35 - [c11]Michael Losavio, Deborah W. Keeling, Adel Said Elmaghraby:
A Distributed Triage Model for Digital Forensic Services to State and Local Law Enforcement. SADFE 2009: 36-37 - [c10]Jean West, Ulf Lindqvist, Peter J. Vasquez, Michael Losavio, Sean Peisert:
Panel: Technical, Social and Legal Frameworks for Digital Forensics and CyberInfrastructure Security. SADFE 2009: 97-98 - 2008
- [c9]Michael Losavio, Deborah W. Keeling, Adel Elmaghraby, George Higgins, John Shutt:
Implications of Attorney Experiences with Digital Forensics and Electronic Evidence in the United States. SADFE 2008: 79-90 - [c8]Olfa Nasraoui, Deborah W. Keeling, Adel Elmaghraby, George Higgins, Michael Losavio:
Node-Based Probing and Monitoring to Investigate Use of Peer-to-Peer Technologies for Distribution of Contraband Material. SADFE 2008: 135-140 - [c7]Michael Losavio, Deborah W. Keeling, Adel Elmaghraby, George Higgins, John Shutt:
Network Forensics: Network Data and State Seizures in the United States. SADFE 2008: 143 - 2007
- [c6]Michael Losavio:
Panel: Lawyers, Judges and Digital Forensics: Evaluating Situational Awareness and Evidentiary Skills with Electronic Evidence, from Cybercrime to Civil Lawsuits.. SADFE 2007: 101 - [c5]Adel Elmaghraby, James H. Graham, Jana Godwin, Michael Losavio, Deborah Wilson:
Challenge - Construction of an Adequate Digital Forensics Testbed. SADFE 2007: 147-149 - [c4]Michael Losavio:
Panel Topic: Education and Interdisciplinary Issues in Digital Forensics, Computer Science and Judicial Process. SADFE 2007: 166 - 2006
- [j2]Michael Losavio, Julia Adams, Marc Rogers:
Gap Analysis: Judicial Experience and Perception of Electronic Evidence. J. Digit. Forensic Pract. 1(1): 13-17 (2006) - [j1]Michael Losavio, Deborah Wilson, Adel Elmaghraby:
Prevalence, Use, and Evidentiary Issues of Digital Evidence of Cellular Telephone Consumer and Small-Scale Digital Devices. J. Digit. Forensic Pract. 1(4): 291-296 (2006) - [c3]Michael Losavio, David King, Adel Elmaghraby, Kevin Price:
Global Opportunities for Service Learning in Computer Science. FECS 2006: 264-269 - 2005
- [c2]Michael Losavio:
Non-Technical Manipulation of Digital Data - Legal, Ethical and Social Issues. IFIP Int. Conf. Digital Forensics 2005: 51-63 - [c1]Michael Martin Losavio:
The Law of Possession of Digital Objects: Dominion and Control Issues for Digital Forensics Investigations and Prosecutions. SADFE 2005: 177-186
Coauthor Index
aka: Adel Elmaghraby
aka: Deborah Wilson Keeling
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint