|
Search the dblp DataBase
Gavin Manes:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- G. Lorenz, J. Keller, Gavin Manes, John Hale, Sujeet Shenoi
Public Telephone Network Vulnerabilities. [Citation Graph (0, 0)][DBLP] DBSec, 2001, pp:151-164 [Conf]
- Jon Novotny, Dominic Schulte, Gavin Manes, Sujeet Shenoi
Remote Computer Fingerprinting for Cyber Crime Investigations. [Citation Graph (0, 0)][DBLP] DBSec, 2003, pp:3-15 [Conf]
- Mark Davis, Gavin Manes, Sujeet Shenoi
A Network-Based Architecture for Storing Digital Evidence. [Citation Graph (0, 0)][DBLP] IFIP Int. Conf. Digital Forensics, 2005, pp:33-42 [Conf]
- Pavel Gershteyn, Mark Davis, Gavin Manes, Sujeet Shenoi
Extracting Concealed Data from BIOS Chips. [Citation Graph (0, 0)][DBLP] IFIP Int. Conf. Digital Forensics, 2005, pp:217-230 [Conf]
- Tyler Moore, Anthony Meehan 0002, Gavin Manes, Sujeet Shenoi
Using Signaling Information in Telecom Network Forensics. [Citation Graph (0, 0)][DBLP] IFIP Int. Conf. Digital Forensics, 2005, pp:177-188 [Conf]
- Scott Piper, Mark Davis, Gavin Manes, Sujeet Shenoi
Detecting Hidden Data in Ext2/Ext3 File Systems. [Citation Graph (0, 0)][DBLP] IFIP Int. Conf. Digital Forensics, 2005, pp:245-256 [Conf]
- Christopher Swenson, Gavin Manes, Sujeet Shenoi
Imaging and Analysis of GSM SIM Cards. [Citation Graph (0, 0)][DBLP] IFIP Int. Conf. Digital Forensics, 2005, pp:205-216 [Conf]
- Gavin Manes, Dominic Schulte, Seth Guenther, Sujeet Shenoi
NetGlean: A Methodology for Distributed Network Security Scanning. [Citation Graph (0, 0)][DBLP] J. Network Syst. Manage., 2005, v:13, n:3, pp:329-344 [Journal]
Redacting Digital Information from Electronic Devices. [Citation Graph (, )][DBLP]
Automobile Event Data Recorder Forensics. [Citation Graph (, )][DBLP]
Passive Detection of NAT Routers and Client Counting. [Citation Graph (, )][DBLP]
Linking Individuals to Digital Information. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|