Paper | PresentationConferenceDownloadsAuthor
Forensics, Fighter Pilots and the OODA Loop – The Role of Digital Forensics in Cyber Command and ControlDFRWS USA 2004 Heather M.B. Dussault (SUNY Institute of Technology), Chet J. Maciag (Air Force Research Laboratory, Information Directorate)
Secure Digital CameraDFRWS USA 2004 Paul Blythe (SUNY Binghamton) and Jessica Fridrich (SUNY Binghamton)
A Functional Reference Model of Passive Network Origin IdentificationDFRWS USA 2003 Thomas Daniels
An Improved Raw Quick Pairs Blind Steganalysis MethodDFRWS USA 2003 Benjamin Rodriquez
Building Theoretical Underpinnings for Digital Forensics ResearchDFRWS USA 2003 Sarah Mocas
Cross-Validation of Filesystem Layers for Computer ForensicsDFRWS USA 2003 Joe Sremack
Detecting Covert Communications on the Internet – Some Challenges and SolutionsDFRWS USA 2003 R. Chandramouli
Discovering Covert Digital EvidenceDFRWS USA 2003 Chet Hosmer and Christopher Hyde
File Classification Using Sub-Sequence KernelsDFRWS USA 2003
Forensic Network Analysis Tools – Strengths, Weaknesses, and Future NeedsDFRWS USA 2003 Eoghan Casey, Ph.D. (University of Lausanne)
ForNet – A Distributed Network Forensics SystemDFRWS USA 2003 Kulesh Shanmugasundaram
Putting the Horse in Front of the CartDFRWS USA 2003 Peter Stephenson
Audit Data Reduction Using Neural Networks and Support Vector MachinesDFRWS USA 2002 Srinivas Mukkamala and Andrew Sung (New Mexico Institute of Mining and Technology)
Automatic Reassembly of Document Fragments via Data CompressionDFRWS USA 2002 Kulesh Shanmugasundaram (Polytechnic University)
Can Digital Evidence Endure the Test of TimeDFRWS USA 2002 Michael Duren and Chet Hosmer (WetStone Technologies, Inc)
Confronting Encryption in Computer InvestigationsDFRWS USA 2002 Eoghan Casey, Ph.D. (Yale University)
Defining Digital Forensic Examination and Analysis ToolsDFRWS USA 2002 Brian Carrier, Ph.D. (@stake)
Language and Gender Author Cohort Analysis of E-mail for Computer ForensicsDFRWS USA 2002 Olivier de Vel, Malcolm Corney, Alison Anderson, and George Mohay (Queensland University of Technology)
Steganalysis with a Computational Immune SystemDFRWS USA 2002 Jacob Jackson, Gregg Gunsch, Roger Claypoole, and Gary Lamont (Air Force Institute of Technology)
Testing Disk Imaging ToolsDFRWS USA 2002 James Lyle (NIST)
The International Journal of Digital EvidenceDFRWS USA 2002 Gary Gordon and John Leeson
A Lessons Learned Repository for Computer ForensicsDFRWS USA 2002 Warren Harrison (Portland State University), George Heuston (Hillsboro Police Department), Mark Morrissey (Portland State University), David Aucsmith (Intel Corporation), Sarah Mocas (Portland State University), and Steve Russelle (Portland Police Bureau)
Analyzing the Difficulties in Backtracking the Onion Router’s TrafficDFRWS USA 2002 Dario Forte (Guardia di finanza Milano)
First Responders Evidence DiskDFRWS USA 2002 Jesse Kornblum (AFOSI)
The Mobile Forensic PlatformDFRWS USA 2002 Frank Adelstein, Ph.D. (ATC-NY)
A Road Map for Digital Forensic ResearchDFRWS USA 2001
Advancing the Exchange of Cyber-Investigation Information between organizations and across borders using CASEDFRWS EU 2019Eoghan Casey, Ph.D. (University of Lausanne), Fabrizio Turchi, Nikolaos Matskanis
Apple watch forensics: is it ever possible, and what is the profit?DFRWS EU 2019 Mattia Epifani (ITTIG - CNR), Vladimir Katalov (ElcomSoft)
Characteristics and Detectability of Windows Auto-Start Extensibility Points in Memory ForensicsDFRWS EU 2019 Daniel Uroz, Ricardo Rodriguez
Chrome Nuts and Bolts: ChromeOS /Chromebook ForensicsDFRWS EU 2019 Jessica Hyde (George Mason University / Magnet Forensics ), Jad Saliba