| Paper | Presentation | Conference | Downloads | Author |
|---|---|---|---|
| Forensics, Fighter Pilots and the OODA Loop – The Role of Digital Forensics in Cyber Command and Control | DFRWS USA 2004 | Heather M.B. Dussault (SUNY Institute of Technology), Chet J. Maciag (Air Force Research Laboratory, Information Directorate) | |
| Secure Digital Camera | DFRWS USA 2004 | Paul Blythe (SUNY Binghamton) and Jessica Fridrich (SUNY Binghamton) | |
| A Functional Reference Model of Passive Network Origin Identification | DFRWS USA 2003 | Thomas Daniels | |
| An Improved Raw Quick Pairs Blind Steganalysis Method | DFRWS USA 2003 | Benjamin Rodriquez | |
| Building Theoretical Underpinnings for Digital Forensics Research | DFRWS USA 2003 | Sarah Mocas | |
| Cross-Validation of Filesystem Layers for Computer Forensics | DFRWS USA 2003 | Joe Sremack | |
| Detecting Covert Communications on the Internet – Some Challenges and Solutions | DFRWS USA 2003 | R. Chandramouli | |
| Discovering Covert Digital Evidence | DFRWS USA 2003 | Chet Hosmer and Christopher Hyde | |
| File Classification Using Sub-Sequence Kernels | DFRWS USA 2003 | ||
| Forensic Network Analysis Tools – Strengths, Weaknesses, and Future Needs | DFRWS USA 2003 | Eoghan Casey, Ph.D. (University of Lausanne) | |
| ForNet – A Distributed Network Forensics System | DFRWS USA 2003 | Kulesh Shanmugasundaram | |
| Putting the Horse in Front of the Cart | DFRWS USA 2003 | Peter Stephenson | |
| Audit Data Reduction Using Neural Networks and Support Vector Machines | DFRWS USA 2002 | Srinivas Mukkamala and Andrew Sung (New Mexico Institute of Mining and Technology) | |
| Automatic Reassembly of Document Fragments via Data Compression | DFRWS USA 2002 | Kulesh Shanmugasundaram (Polytechnic University) | |
| Can Digital Evidence Endure the Test of Time | DFRWS USA 2002 | Michael Duren and Chet Hosmer (WetStone Technologies, Inc) | |
| Confronting Encryption in Computer Investigations | DFRWS USA 2002 | Eoghan Casey, Ph.D. (Yale University) | |
| Defining Digital Forensic Examination and Analysis Tools | DFRWS USA 2002 | Brian Carrier, Ph.D. (@stake) | |
| Language and Gender Author Cohort Analysis of E-mail for Computer Forensics | DFRWS USA 2002 | Olivier de Vel, Malcolm Corney, Alison Anderson, and George Mohay (Queensland University of Technology) | |
| Steganalysis with a Computational Immune System | DFRWS USA 2002 | Jacob Jackson, Gregg Gunsch, Roger Claypoole, and Gary Lamont (Air Force Institute of Technology) | |
| Testing Disk Imaging Tools | DFRWS USA 2002 | James Lyle (NIST) | |
| The International Journal of Digital Evidence | DFRWS USA 2002 | Gary Gordon and John Leeson | |
| A Lessons Learned Repository for Computer Forensics | DFRWS USA 2002 | Warren Harrison (Portland State University), George Heuston (Hillsboro Police Department), Mark Morrissey (Portland State University), David Aucsmith (Intel Corporation), Sarah Mocas (Portland State University), and Steve Russelle (Portland Police Bureau) | |
| Analyzing the Difficulties in Backtracking the Onion Router’s Traffic | DFRWS USA 2002 | Dario Forte (Guardia di finanza Milano) | |
| First Responders Evidence Disk | DFRWS USA 2002 | Jesse Kornblum (AFOSI) | |
| The Mobile Forensic Platform | DFRWS USA 2002 | Frank Adelstein, Ph.D. (ATC-NY) | |
| A Road Map for Digital Forensic Research | DFRWS USA 2001 | ||
| Advancing the Exchange of Cyber-Investigation Information between organizations and across borders using CASE | DFRWS EU 2019 | Eoghan Casey, Ph.D. (University of Lausanne), Fabrizio Turchi, Nikolaos Matskanis | |
| Apple watch forensics: is it ever possible, and what is the profit? | DFRWS EU 2019 | Mattia Epifani (ITTIG - CNR), Vladimir Katalov (ElcomSoft) | |
| Characteristics and Detectability of Windows Auto-Start Extensibility Points in Memory Forensics | DFRWS EU 2019 | Daniel Uroz, Ricardo Rodriguez | |
| Chrome Nuts and Bolts: ChromeOS /Chromebook Forensics | DFRWS EU 2019 | Jessica Hyde (George Mason University / Magnet Forensics ), Jad Saliba |