![]() |
| 2006 | ||
|---|---|---|
| 10 | EE | Brian D. Carrier: Risks of live digital forensic analysis. Commun. ACM 49(2): 56-61 (2006) |
| 9 | EE | Brian D. Carrier, Eugene H. Spafford: Categories of digital investigation analysis techniques based on the computer history model. Digital Investigation 3(Supplement-1): 121-130 (2006) |
| 2005 | ||
| 8 | EE | Brian D. Carrier, Eugene H. Spafford: Automated Digital Evidence Target Definition Using Outlier Analysis and Existing Evidence. DFRWS 2005 |
| 7 | EE | Brian D. Carrier: Volume analysis of disk spanning logical volumes. Digital Investigation 2(2): 78-88 (2005) |
| 2004 | ||
| 6 | EE | Brian D. Carrier, Blake Matheny: Methods for Cluster-Based Incident Detection. IWIA 2004: 71-78 |
| 5 | EE | Brian D. Carrier, Clay Shields: The session token protocol for forensics and traceback. ACM Trans. Inf. Syst. Secur. 7(3): 333-362 (2004) |
| 4 | EE | Brian D. Carrier, Joe Grand: A hardware-based memory acquisition procedure for digital investigations. Digital Investigation 1(1): 50-60 (2004) |
| 2003 | ||
| 3 | EE | Brian D. Carrier: Defining Digital Forensic Examination and Analysis Tool Using Abstraction Layers. IJDE 1(4): (2003) |
| 2 | EE | Brian D. Carrier, Eugene H. Spafford: Getting Physical with the Digital Investigation Process. IJDE 2(2): (2003) |
| 2002 | ||
| 1 | EE | Brian D. Carrier, Clay Shields: A Recursive Session Token Protocol for use in Computer Forensics and TCP Traceback. INFOCOM 2002 |
| 1 | Joe Grand | [4] |
| 2 | Blake Matheny | [6] |
| 3 | Clay Shields | [1] [5] |
| 4 | Eugene H. Spafford | [2] [8] [9] |