Paper | Presentation | Conference | Downloads | Author |
---|
Forensics, Fighter Pilots and the OODA Loop – The Role of Digital Forensics in Cyber Command and Control | DFRWS USA 2004 |
| Heather M.B. Dussault (SUNY Institute of Technology), Chet J. Maciag (Air Force Research Laboratory, Information Directorate) |
Secure Digital Camera | DFRWS USA 2004 |
| Paul Blythe (SUNY Binghamton) and Jessica Fridrich (SUNY Binghamton) |
A Functional Reference Model of Passive Network Origin Identification | DFRWS USA 2003 |
| Thomas Daniels |
An Improved Raw Quick Pairs Blind Steganalysis Method | DFRWS USA 2003 |
| Benjamin Rodriquez |
Building Theoretical Underpinnings for Digital Forensics Research | DFRWS USA 2003 |
| Sarah Mocas |
Cross-Validation of Filesystem Layers for Computer Forensics | DFRWS USA 2003 |
| Joe Sremack |
Detecting Covert Communications on the Internet – Some Challenges and Solutions | DFRWS USA 2003 |
| R. Chandramouli |
Discovering Covert Digital Evidence | DFRWS USA 2003 |
| Chet Hosmer and Christopher Hyde |
File Classification Using Sub-Sequence Kernels | DFRWS USA 2003 |
| |
Forensic Network Analysis Tools – Strengths, Weaknesses, and Future Needs | DFRWS USA 2003 |
| Eoghan Casey, Ph.D. (University of Lausanne) |
ForNet – A Distributed Network Forensics System | DFRWS USA 2003 |
| Kulesh Shanmugasundaram |
Putting the Horse in Front of the Cart | DFRWS USA 2003 |
| Peter Stephenson |
Audit Data Reduction Using Neural Networks and Support Vector Machines | DFRWS USA 2002 |
| Srinivas Mukkamala and Andrew Sung (New Mexico Institute of Mining and Technology) |
Automatic Reassembly of Document Fragments via Data Compression | DFRWS USA 2002 |
| Kulesh Shanmugasundaram (Polytechnic University) |
Can Digital Evidence Endure the Test of Time | DFRWS USA 2002 |
| Michael Duren and Chet Hosmer (WetStone Technologies, Inc) |
Confronting Encryption in Computer Investigations | DFRWS USA 2002 |
| Eoghan Casey, Ph.D. (Yale University) |
Defining Digital Forensic Examination and Analysis Tools | DFRWS USA 2002 |
| Brian Carrier, Ph.D. (@stake) |
Language and Gender Author Cohort Analysis of E-mail for Computer Forensics | DFRWS USA 2002 |
| Olivier de Vel, Malcolm Corney, Alison Anderson, and George Mohay (Queensland University of Technology) |
Steganalysis with a Computational Immune System | DFRWS USA 2002 |
| Jacob Jackson, Gregg Gunsch, Roger Claypoole, and Gary Lamont (Air Force Institute of Technology) |
Testing Disk Imaging Tools | DFRWS USA 2002 |
| James Lyle (NIST) |
The International Journal of Digital Evidence | DFRWS USA 2002 |
| Gary Gordon and John Leeson |
A Lessons Learned Repository for Computer Forensics | DFRWS USA 2002 |
| Warren Harrison (Portland State University), George Heuston (Hillsboro Police Department), Mark Morrissey (Portland State University), David Aucsmith (Intel Corporation), Sarah Mocas (Portland State University), and Steve Russelle (Portland Police Bureau) |
Analyzing the Difficulties in Backtracking the Onion Router’s Traffic | DFRWS USA 2002 |
| Dario Forte (Guardia di finanza Milano) |
First Responders Evidence Disk | DFRWS USA 2002 |
| Jesse Kornblum (AFOSI) |
The Mobile Forensic Platform | DFRWS USA 2002 |
| Frank Adelstein, Ph.D. (ATC-NY) |
A Road Map for Digital Forensic Research | DFRWS USA 2001 |
| |
Advancing the Exchange of Cyber-Investigation Information between organizations and across borders using CASE | DFRWS EU 2019 | | Eoghan Casey, Ph.D. (University of Lausanne), Fabrizio Turchi, Nikolaos Matskanis |
Apple watch forensics: is it ever possible, and what is the profit? | DFRWS EU 2019 |
| Mattia Epifani (ITTIG - CNR), Vladimir Katalov (ElcomSoft) |
Characteristics and Detectability of Windows Auto-Start Extensibility Points in Memory Forensics | DFRWS EU 2019 |
| Daniel Uroz, Ricardo Rodriguez |
Chrome Nuts and Bolts: ChromeOS /Chromebook Forensics | DFRWS EU 2019 |
| Jessica Hyde (George Mason University / Magnet Forensics ), Jad Saliba |