dblp.uni-trier.dewww.uni-trier.de

Eoghan Casey

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
27EEEoghan Casey: "Dawn raids" bring a new form in incident response. Digital Investigation 5(3-4): 73-74 (2009)
2008
26EEEoghan Casey: State of the Journal. Digital Investigation 5(1-2): 1-2 (2008)
2007
25EEEoghan Casey: Digital evidence maps - A sign of the times. Digital Investigation 4(1): 1-2 (2007)
24EEEoghan Casey: What does "forensically sound" really mean? Digital Investigation 4(2): 49-50 (2007)
23EEEoghan Casey: Attacks against forensic analysis. Digital Investigation 4(3-4): 105-106 (2007)
2006
22EEEoghan Casey: Investigating sophisticated security breaches. Commun. ACM 49(2): 48-55 (2006)
21EEEoghan Casey, Stroz Friedberg: Moving forward in a changing landscape. Digital Investigation 3(1): 1-2 (2006)
20EEEoghan Casey: Applications of research. Digital Investigation 3(1): 16 (2006)
19EEEoghan Casey: The value of behavioral analysis in digital investigations. Digital Investigation 3(2): 57-58 (2006)
18EEEoghan Casey: Applications of Research. Digital Investigation 3(2): 84 (2006)
17EEEoghan Casey: This little laptop went to the black market. Digital Investigation 3(3): 107-108 (2006)
16EEEoghan Casey: Applications of research. Digital Investigation 3(3): 136-137 (2006)
15EEEoghan Casey: Cutting corners: Trading justice for cost savings. Digital Investigation 3(4): 185-186 (2006)
2005
14EEEoghan Casey, Gary Gordon, John Leeson: Origins and progress. Digital Investigation 2(1): 1-2 (2005)
13EEEoghan Casey: Growing pains. Digital Investigation 2(2): 71-73 (2005)
12EEEoghan Casey: Investigating security breaches. Digital Investigation 2(3): 169-170 (2005)
11EEEoghan Casey: Digital arms race - The need for speed. Digital Investigation 2(4): 229-230 (2005)
10EEEoghan Casey: Case study: Network intrusion investigation - lessons in forensic preparation. Digital Investigation 2(4): 254-260 (2005)
2004
9EEEoghan Casey: The need for knowledge sharing and standardization. Digital Investigation 1(1): 1-2 (2004)
8EEEoghan Casey: Network traffic as a source of evidence: tool strengths, weaknesses, and future needs. Digital Investigation 1(1): 28-43 (2004)
7EEEoghan Casey: Tool review - WinHex. Digital Investigation 1(2): 114-128 (2004)
6EEEoghan Casey: The need for objective case review. Digital Investigation 1(2): 83-85 (2004)
5EEEoghan Casey: Reporting security breaches - a risk to be avoided or responsibility to be embraced? Digital Investigation 1(3): 151-161 (2004)
4EEEoghan Casey: State of the field: growth, growth, growth. Digital Investigation 1(4): 241-242 (2004)
3EEEoghan Casey, Aaron Stanley: Tool review - remote forensic preservation and examination tools. Digital Investigation 1(4): 284-297 (2004)
2002
2EEEoghan Casey: Error, Uncertainty and Loss in Digital Evidence. IJDE 1(2): (2002)
1EEEoghan Casey: Practical Approaches to Recovering Encrypted Digital Evidence. IJDE 1(3): (2002)

Coauthor Index

1Stroz Friedberg [21]
2Gary Gordon [14]
3John Leeson [14]
4Aaron Stanley [3]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)