2009 | ||
---|---|---|
27 | EE | Eoghan Casey: "Dawn raids" bring a new form in incident response. Digital Investigation 5(3-4): 73-74 (2009) |
2008 | ||
26 | EE | Eoghan Casey: State of the Journal. Digital Investigation 5(1-2): 1-2 (2008) |
2007 | ||
25 | EE | Eoghan Casey: Digital evidence maps - A sign of the times. Digital Investigation 4(1): 1-2 (2007) |
24 | EE | Eoghan Casey: What does "forensically sound" really mean? Digital Investigation 4(2): 49-50 (2007) |
23 | EE | Eoghan Casey: Attacks against forensic analysis. Digital Investigation 4(3-4): 105-106 (2007) |
2006 | ||
22 | EE | Eoghan Casey: Investigating sophisticated security breaches. Commun. ACM 49(2): 48-55 (2006) |
21 | EE | Eoghan Casey, Stroz Friedberg: Moving forward in a changing landscape. Digital Investigation 3(1): 1-2 (2006) |
20 | EE | Eoghan Casey: Applications of research. Digital Investigation 3(1): 16 (2006) |
19 | EE | Eoghan Casey: The value of behavioral analysis in digital investigations. Digital Investigation 3(2): 57-58 (2006) |
18 | EE | Eoghan Casey: Applications of Research. Digital Investigation 3(2): 84 (2006) |
17 | EE | Eoghan Casey: This little laptop went to the black market. Digital Investigation 3(3): 107-108 (2006) |
16 | EE | Eoghan Casey: Applications of research. Digital Investigation 3(3): 136-137 (2006) |
15 | EE | Eoghan Casey: Cutting corners: Trading justice for cost savings. Digital Investigation 3(4): 185-186 (2006) |
2005 | ||
14 | EE | Eoghan Casey, Gary Gordon, John Leeson: Origins and progress. Digital Investigation 2(1): 1-2 (2005) |
13 | EE | Eoghan Casey: Growing pains. Digital Investigation 2(2): 71-73 (2005) |
12 | EE | Eoghan Casey: Investigating security breaches. Digital Investigation 2(3): 169-170 (2005) |
11 | EE | Eoghan Casey: Digital arms race - The need for speed. Digital Investigation 2(4): 229-230 (2005) |
10 | EE | Eoghan Casey: Case study: Network intrusion investigation - lessons in forensic preparation. Digital Investigation 2(4): 254-260 (2005) |
2004 | ||
9 | EE | Eoghan Casey: The need for knowledge sharing and standardization. Digital Investigation 1(1): 1-2 (2004) |
8 | EE | Eoghan Casey: Network traffic as a source of evidence: tool strengths, weaknesses, and future needs. Digital Investigation 1(1): 28-43 (2004) |
7 | EE | Eoghan Casey: Tool review - WinHex. Digital Investigation 1(2): 114-128 (2004) |
6 | EE | Eoghan Casey: The need for objective case review. Digital Investigation 1(2): 83-85 (2004) |
5 | EE | Eoghan Casey: Reporting security breaches - a risk to be avoided or responsibility to be embraced? Digital Investigation 1(3): 151-161 (2004) |
4 | EE | Eoghan Casey: State of the field: growth, growth, growth. Digital Investigation 1(4): 241-242 (2004) |
3 | EE | Eoghan Casey, Aaron Stanley: Tool review - remote forensic preservation and examination tools. Digital Investigation 1(4): 284-297 (2004) |
2002 | ||
2 | EE | Eoghan Casey: Error, Uncertainty and Loss in Digital Evidence. IJDE 1(2): (2002) |
1 | EE | Eoghan Casey: Practical Approaches to Recovering Encrypted Digital Evidence. IJDE 1(3): (2002) |
1 | Stroz Friedberg | [21] |
2 | Gary Gordon | [14] |
3 | John Leeson | [14] |
4 | Aaron Stanley | [3] |