File System Forensic Analysis B Carrier Addison-Wesley, 2005 | 1141 | 2005 |
Getting physical with the digital investigation process B Carrier, EH Spafford International Journal of digital evidence 2 (2), 1-20, 2003 | 748 | 2003 |
An event-based digital forensic investigation framework B Carrier, E Spafford Digital Investigation, 2004 | 405 | 2004 |
Defining digital forensic examination and analysis tools using abstraction layers B Carrier International Journal of digital evidence 1 (4), 1-12, 2003 | 371 | 2003 |
A hardware-based memory acquisition procedure for digital investigations BD Carrier, J Grand Digital Investigation 1 (1), 50-60, 2004 | 330 | 2004 |
Open source digital forensics tools: The legal argument B Carrier stake, 2002 | 223 | 2002 |
A hypothesis-based approach to digital forensic investigations BD Carrier Purdue University, 2006 | 142 | 2006 |
Risks of live digital forensic analysis BD Carrier Communications of the ACM 49 (2), 56-61, 2006 | 134 | 2006 |
The sleuth kit B Carrier TSK–sleuthkit. org, 2011 | 104 | 2011 |
Categories of digital investigation analysis techniques based on the computer history model BD Carrier, EH Spafford digital investigation 3, 121-130, 2006 | 97 | 2006 |
Defining event reconstruction of digital crime scenes BD Carrier, EH Spafford Journal of Forensic and Sciences 49 (6), JFS2004127-8, 2004 | 97 | 2004 |
Defining digital forensic examination and analysis tools B Carrier Digital Investigation, 2002 | 96 | 2002 |
Automated Digital Evidence Target Definition Using Outlier Analysis and Existing Evidence. BD Carrier, EH Spafford DFRWS, 2005 | 81 | 2005 |
The Trojan horse defense in cybercrime cases SW Brenner, B Carrier, J Henninger Santa Clara Computer & High Tech. LJ 21, 1, 2004 | 60 | 2004 |
Digital forensics works BD Carrier IEEE Security & Privacy 7 (2), 26-29, 2009 | 38 | 2009 |
Open source digital forensics tools B Carrier The legal argument, 2003 | 34 | 2003 |
A recursive session token protocol for use in computer forensics and tcp traceback B Carrier, C Shields Proceedings. Twenty-First Annual Joint Conference of the IEEE Computer and …, 2002 | 33 | 2002 |
The session token protocol for forensics and traceback B Carrier, C Shields ACM Transactions on Information and System Security (TISSEC) 7 (3), 333-362, 2004 | 29 | 2004 |
Standardizing digital evidence storage Common Digital Evidence Storage Format Working Group Communications of the ACM 49 (2), 67-68, 2006 | 25 | 2006 |
Method and apparatus for preserving computer memory using expansion card J Grand, B Carrier US Patent 7,181,560, 2007 | 19 | 2007 |