Paper | Presentation |
Conference |
Downloads |
Author |
Forensics, Fighter Pilots and the OODA Loop – The Role of Digital Forensics in Cyber Command and Control |
DFRWS USA 2004 |
|
Heather M.B. Dussault (SUNY Institute of Technology), Chet J. Maciag (Air Force Research Laboratory, Information Directorate) |
Secure Digital Camera |
DFRWS USA 2004 |
|
Paul Blythe (SUNY Binghamton) and Jessica Fridrich (SUNY Binghamton) |
A Functional Reference Model of Passive Network Origin Identification |
DFRWS USA 2003 |
|
Thomas Daniels |
An Improved Raw Quick Pairs Blind Steganalysis Method |
DFRWS USA 2003 |
|
Benjamin Rodriquez |
Building Theoretical Underpinnings for Digital Forensics Research |
DFRWS USA 2003 |
|
Sarah Mocas |
Cross-Validation of Filesystem Layers for Computer Forensics |
DFRWS USA 2003 |
|
Joe Sremack |
Detecting Covert Communications on the Internet – Some Challenges and Solutions |
DFRWS USA 2003 |
|
R. Chandramouli |
Discovering Covert Digital Evidence |
DFRWS USA 2003 |
|
Chet Hosmer and Christopher Hyde |
File Classification Using Sub-Sequence Kernels |
DFRWS USA 2003 |
|
|
Forensic Network Analysis Tools – Strengths, Weaknesses, and Future Needs |
DFRWS USA 2003 |
|
Eoghan Casey, Ph.D. (University of Lausanne) |
ForNet – A Distributed Network Forensics System |
DFRWS USA 2003 |
|
Kulesh Shanmugasundaram |
Putting the Horse in Front of the Cart |
DFRWS USA 2003 |
|
Peter Stephenson |
Audit Data Reduction Using Neural Networks and Support Vector Machines |
DFRWS USA 2002 |
|
Srinivas Mukkamala and Andrew Sung (New Mexico Institute of Mining and Technology) |
Automatic Reassembly of Document Fragments via Data Compression |
DFRWS USA 2002 |
|
Kulesh Shanmugasundaram (Polytechnic University) |
Can Digital Evidence Endure the Test of Time |
DFRWS USA 2002 |
|
Michael Duren and Chet Hosmer (WetStone Technologies, Inc) |
Confronting Encryption in Computer Investigations |
DFRWS USA 2002 |
|
Eoghan Casey, Ph.D. (Yale University) |
Defining Digital Forensic Examination and Analysis Tools |
DFRWS USA 2002 |
|
Brian Carrier, Ph.D. (@stake) |
Language and Gender Author Cohort Analysis of E-mail for Computer Forensics |
DFRWS USA 2002 |
|
Olivier de Vel, Malcolm Corney, Alison Anderson, and George Mohay (Queensland University of Technology) |
Steganalysis with a Computational Immune System |
DFRWS USA 2002 |
|
Jacob Jackson, Gregg Gunsch, Roger Claypoole, and Gary Lamont (Air Force Institute of Technology) |
Testing Disk Imaging Tools |
DFRWS USA 2002 |
|
James Lyle (NIST) |
The International Journal of Digital Evidence |
DFRWS USA 2002 |
|
Gary Gordon and John Leeson |
A Lessons Learned Repository for Computer Forensics |
DFRWS USA 2002 |
|
Warren Harrison (Portland State University), George Heuston (Hillsboro Police Department), Mark Morrissey (Portland State University), David Aucsmith (Intel Corporation), Sarah Mocas (Portland State University), and Steve Russelle (Portland Police Bureau) |
Analyzing the Difficulties in Backtracking the Onion Router’s Traffic |
DFRWS USA 2002 |
|
Dario Forte (Guardia di finanza Milano) |
First Responders Evidence Disk |
DFRWS USA 2002 |
|
Jesse Kornblum (AFOSI) |
The Mobile Forensic Platform |
DFRWS USA 2002 |
|
Frank Adelstein, Ph.D. (ATC-NY) |
A Road Map for Digital Forensic Research |
DFRWS USA 2001 |
|
|
Advancing the Exchange of Cyber-Investigation Information between organizations and across borders using CASE |
DFRWS EU 2019 |
|
Eoghan Casey, Ph.D. (University of Lausanne), Fabrizio Turchi, Nikolaos Matskanis |
Apple watch forensics: is it ever possible, and what is the profit? |
DFRWS EU 2019 |
|
Mattia Epifani (ITTIG - CNR), Vladimir Katalov (ElcomSoft) |
Characteristics and Detectability of Windows Auto-Start Extensibility Points in Memory Forensics |
DFRWS EU 2019 |
|
Daniel Uroz, Ricardo Rodriguez |
Chrome Nuts and Bolts: ChromeOS /Chromebook Forensics |
DFRWS EU 2019 |
|
Jessica Hyde (George Mason University / Magnet Forensics ), Jad Saliba |