|
Search the dblp DataBase
Brian D. Carrier:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Brian D. Carrier, Eugene H. Spafford
Automated Digital Evidence Target Definition Using Outlier Analysis and Existing Evidence. [Citation Graph (0, 0)][DBLP] DFRWS, 2005, pp:- [Conf]
- Brian D. Carrier, Clay Shields
A Recursive Session Token Protocol for use in Computer Forensics and TCP Traceback. [Citation Graph (0, 0)][DBLP] INFOCOM, 2002, pp:- [Conf]
- Brian D. Carrier, Blake Matheny
Methods for Cluster-Based Incident Detection. [Citation Graph (0, 0)][DBLP] IWIA, 2004, pp:71-78 [Conf]
- Brian D. Carrier
Risks of live digital forensic analysis. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2006, v:49, n:2, pp:56-61 [Journal]
- Brian D. Carrier
Volume analysis of disk spanning logical volumes. [Citation Graph (0, 0)][DBLP] Digital Investigation, 2005, v:2, n:2, pp:78-88 [Journal]
- Brian D. Carrier, Joe Grand
A hardware-based memory acquisition procedure for digital investigations. [Citation Graph (0, 0)][DBLP] Digital Investigation, 2004, v:1, n:1, pp:50-60 [Journal]
- Brian D. Carrier, Eugene H. Spafford
Categories of digital investigation analysis techniques based on the computer history model. [Citation Graph (0, 0)][DBLP] Digital Investigation, 2006, v:3, n:Supplement-1, pp:121-130 [Journal]
- Brian D. Carrier, Clay Shields
The session token protocol for forensics and traceback. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:3, pp:333-362 [Journal]
Search in 0.003secs, Finished in 0.004secs
|