2009 | ||
---|---|---|
6 | EE | Jesse D. Kornblum: Implementing BitLocker Drive Encryption for forensic analysis. Digital Investigation 5(3-4): 75-84 (2009) |
2008 | ||
5 | EE | Jesse D. Kornblum: Auditing Hash Sets: Lessons Learned from Jurassic Park. J. Digital Forensic Practice 2(3): 108-112 (2008) |
2007 | ||
4 | EE | Jesse D. Kornblum: Using every part of the buffalo in Windows memory analysis. Digital Investigation 4(1): 24-29 (2007) |
2006 | ||
3 | EE | Jesse D. Kornblum: Identifying almost identical files using context triggered piecewise hashing. Digital Investigation 3(Supplement-1): 91-97 (2006) |
2 | EE | Jesse D. Kornblum: Exploiting the Rootkit Paradox with Windows Memory Analysis. IJDE 5(1): (2006) |
2004 | ||
1 | EE | Jesse D. Kornblum: The Linux Kernel and the Forensic Acquisition of Hard Discs with an Odd Number of Sectors. IJDE 3(2): (2004) |