2006 | ||
---|---|---|
10 | EE | Brian D. Carrier: Risks of live digital forensic analysis. Commun. ACM 49(2): 56-61 (2006) |
9 | EE | Brian D. Carrier, Eugene H. Spafford: Categories of digital investigation analysis techniques based on the computer history model. Digital Investigation 3(Supplement-1): 121-130 (2006) |
2005 | ||
8 | EE | Brian D. Carrier, Eugene H. Spafford: Automated Digital Evidence Target Definition Using Outlier Analysis and Existing Evidence. DFRWS 2005 |
7 | EE | Brian D. Carrier: Volume analysis of disk spanning logical volumes. Digital Investigation 2(2): 78-88 (2005) |
2004 | ||
6 | EE | Brian D. Carrier, Blake Matheny: Methods for Cluster-Based Incident Detection. IWIA 2004: 71-78 |
5 | EE | Brian D. Carrier, Clay Shields: The session token protocol for forensics and traceback. ACM Trans. Inf. Syst. Secur. 7(3): 333-362 (2004) |
4 | EE | Brian D. Carrier, Joe Grand: A hardware-based memory acquisition procedure for digital investigations. Digital Investigation 1(1): 50-60 (2004) |
2003 | ||
3 | EE | Brian D. Carrier: Defining Digital Forensic Examination and Analysis Tool Using Abstraction Layers. IJDE 1(4): (2003) |
2 | EE | Brian D. Carrier, Eugene H. Spafford: Getting Physical with the Digital Investigation Process. IJDE 2(2): (2003) |
2002 | ||
1 | EE | Brian D. Carrier, Clay Shields: A Recursive Session Token Protocol for use in Computer Forensics and TCP Traceback. INFOCOM 2002 |
1 | Joe Grand | [4] |
2 | Blake Matheny | [6] |
3 | Clay Shields | [1] [5] |
4 | Eugene H. Spafford | [2] [8] [9] |