2009 |
6 | EE | Jesse D. Kornblum:
Implementing BitLocker Drive Encryption for forensic analysis.
Digital Investigation 5(3-4): 75-84 (2009) |
2008 |
5 | EE | Jesse D. Kornblum:
Auditing Hash Sets: Lessons Learned from Jurassic Park.
J. Digital Forensic Practice 2(3): 108-112 (2008) |
2007 |
4 | EE | Jesse D. Kornblum:
Using every part of the buffalo in Windows memory analysis.
Digital Investigation 4(1): 24-29 (2007) |
2006 |
3 | EE | Jesse D. Kornblum:
Identifying almost identical files using context triggered piecewise hashing.
Digital Investigation 3(Supplement-1): 91-97 (2006) |
2 | EE | Jesse D. Kornblum:
Exploiting the Rootkit Paradox with Windows Memory Analysis.
IJDE 5(1): (2006) |
2004 |
1 | EE | Jesse D. Kornblum:
The Linux Kernel and the Forensic Acquisition of Hard Discs with an Odd Number of Sectors.
IJDE 3(2): (2004) |