Child pages
  • Articles Citing the RDC
Skip to end of metadata
Go to start of metadata

Below is a list of articles citing the RDC according to a Google Scholar search as of 5/26/2017.

ArticleCited By
Garfinkel, S., Farrell, P., Roussev, V., & Dinolt, G. (2009). Bringing science to digital forensics with standardized forensic corpora. digital investigation, 6, S2-S11.196
Beverly, R., Garfinkel, S., & Cardwell, G. (2011). Forensic carving of network packets and associated data structures. digital investigation, 8, S78-S89.45
Garfinkel, S. (2012). Lessons learned writing digital forensics tools and managing a 30TB digital evidence corpus. Digital Investigation, 9, S80-S89.28
Garfinkel, S. L. (2010). Digital forensics research: The next 10 years. digital investigation, 7, S64-S73.400
Vidas, T. (2011, January). MemCorp: An open data corpus for memory analysis. In System Sciences (HICSS), 2011 44th Hawaii International Conference on (pp. 1-6). IEEE.4
Woods, K., Lee, C. A., & Garfinkel, S. (2011, June). Extending digital repository architectures to support disk image preservation and access. In Proceedings of the 11th annual international ACM/IEEE joint conference on Digital libraries (pp. 57-66). ACM.18
vidas, T. (2011, January). MemCorp: An open data corpus for memory analysis. In System Sciences (HICSS), 2011 44th Hawaii International Conference on (pp. 1-6). IEEE.64
Nelson, A. (2012, January). XML conversion of the windows registry for forensic processing and distribution. In IFIP International Conference on Digital Forensics (pp. 51-65). Springer Berlin Heidelberg.7
Gomez, L. S. M. (2012). Triage in-Lab: case backlog reduction with forensic digital profiling. In Proceedings of the Argentine Conference on Informatics and Argentine Symposium on Computing and Law (pp. 217-225).6
Rowe, N. C. (2013, September). Identifying forensically uninteresting files using a large corpus. In International Conference on Digital Forensics and Cyber Crime (pp. 86-101). Springer International Publishing.8
Rowe, N. C., & Garfinkel, S. L. (2010, May). Global analysis of drive file times. In Systematic Approaches to Digital Forensic Engineering (SADFE), 2010 Fifth IEEE International Workshop on (pp. 97-108). IEEE.8
Brown, R. D. (2011). Reconstructing corrupt DEFLATEd files. digital investigation, 8, S125-S131.12
Lee, C. A., & Woods, K. (2012, September). Automated redaction of private and personal data in collections: Toward responsible stewardship of digital heritage. In Proceedings of Memory of the World in the Digital Age: Digitization and Preservation: An International Conference on Permanent Access to Digital Documentary Heritage (pp. 26-28).5
Garfinkel, S. L. (2013). Digital Forensics Innovation: Searching a Terabyte of Data in 10 Minutes. DCACM 2013, Washington DC.3
Rowe, N. C., Garfinkel, S. L., Beverly, R., & Yannakogeorgos, P. A. (2013). Challenges in monitoring cyberarms compliance. P. Yannakogeorgos and A. Lowther, Conflict and Cooperation in Cyberspace: The Challenge to National Security in Cyberspace, 81-100.8
Huynh, D. P. (2008). Exploring and validating data mining algorithms for use in data ascription (Doctoral dissertation, Monterey, California. Naval Postgraduate School).4
Lee, C. A., & Woods, K. (2012, September). Automated redaction of private and personal data in collections. In Proc. Memory of the World in the Digital Age: Digitization and Preservation International Conf (pp. 298-313).3
Garfinkel, S. L., Parker-Wood, A., Huynh, D., & Migletz, J. (2010). An automated solution to the multiuser carved data ascription problem. IEEE Transactions on Information Forensics and Security, 5(4), 868-882.12
Scholtz, J. (2010). Towards an Automated Digital Data Forensic Model with specific reference to Investigation Processes (Doctoral dissertation, Auckland University of Technology).3
Baggili, I., & Breitinger, F. (2015, March). Data sources for advancing cyber forensics: What the social world has to offer. In 2015 AAAI Spring Symposium Series.3
Garfinkel, S. (2010, June). Aff and aff4: Where we are, where we are going, and why it matters to you. In Sleuth Kit and Open Source Digital Forensics Conference.2
Noel, G. E., & Peterson, G. L. (2014). Applicability of Latent Dirichlet Allocation to multi-disk search. Digital Investigation, 11(1), 43-56.9
Garfinkel, S. L. (2014). The Prevalence of Encoded Digital Trace Evidence in the Nonfile Space of Computer Media. Journal of forensic sciences, 59(5), 1386-1393.2
Dash, P., & Campus, C. (2014). Fast Processing of Large (Big) Forensics Data.1
Rowe, N. C. (2015, July). Finding contextual clues to malware using a large corpus. In Computers and Communication (ISCC), 2015 IEEE Symposium on (pp. 229-236). IEEE.1
Redwine, G., Kirschenbaum, M., Olson, M., & Farr, E. (2010). Born Digital: The 21st Century Archive in Practice and Theory. Digital Humanities 2010, 71.1
Garcia, J. (2014, July). An evaluation of side-information assisted forensic hash matching. In Computer Software and Applications Conference Workshops (COMPSACW), 2014 IEEE 38th International (pp. 331-336). IEEE.1
Rowe, N., Garfinkel, S., Beverly, R., & Yannakogeorgos, P. (2011, July). Steps towards Monitoring Cyberarms Compliance. In European Conference on Information Warfare and Security (p. 221). Academic Conferences International Limited.1
Rowe, N. C., Schwamm, R., McCarrin, M. R., & Gera, R. (2016). Making Sense of Email Addresses on Drives. The Journal of Digital Forensics, Security and Law: JDFSL, 11(2), 153.1
Schwamm, R., & Rowe, N. C. (2014). Effects of the factory reset on mobile devices. Journal of Digital Forensics, Security and Law, 9(2), 205-220.7
Zarate, C., Garfinkel, S., Heffernan, A., Horras, S., & Gorak, K. (2014, January). Analysis of the Use of XOR as an Obfuscation Technique in a Real Data Corpus. In IFIP International Conference on Digital Forensics (pp. 117-132). Springer Berlin Heidelberg. 
An, J. (2016). A responsible de-identification of the Real Data Corpus: building a framework for PII management (Doctoral dissertation, Monterey, California: Naval Postgraduate School). 
Garfinkel, S. (2012). Lessons Learned Writing Computer Forensics Tools and Managing a 30TB Digital Evidence Corpus. 
Farrell, P., Dinolt, G., Roussev, V., & Garfinkel, S. (2009). Bringing science to digital forensics with standardized forensic corpora. 
Yannikos, Y., Graner, L., Steinebach, M., & Winter, C. (2014, January). Data Corpora for Digital Forensics Education and Research. In IFIP International Conference on Digital Forensics (pp. 309-325). Springer Berlin Heidelberg.1
Garfinkel, S. L. (2013). Lessons learned managing a 60TB digital evidence corpus and writing digital forensics tools. 
Zarate, C., Garfinkel, S. L., Heffernan, A., Gorak, K., & Horras, S. (2014). A Survey of XOR as a Digital Obfuscation Technique in a Corpus of Real Data (No. NPS-CS-13-005). NAVAL POSTGRADUATE SCHOOL MONTEREY CA.1
Buchanan, W. J., Macfarlane, R. J., Flandrin, F., Graves, J., Buchanan, B., Fan, L., ... & Ludwiniak, R. (2011). Cloud-based Digital Forensics Evaluation Test (D-FET) Platform. 
Gorak, K., Heffernan, A., Zarate, C., Horras, S., & Garfinkel, S. L. (2014). A Survey of XOR as a Digital Obfuscation Technique in a Corpus of Real Data. Monterey, California. Naval Postgraduate School. 
Peterson, G., & Shenoi, S. (2014). Advances in Digital Forensics X. Springer. 
Mohammed, H., Clarke, N., & Li, F. (2016). An Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data. The Journal of Digital Forensics, Security and Law: JDFSL, 11(2), 137. 
Garfinkel, S. L. (2014). Bulk Data Analysis With Optimistic Decoding and Sector Hashing. 
Lee, C. A., Woods, K., & Garfinkel, S. (2011). Extending Digital Repository Architectures to Support Disk Image Preservation and Access. 
Glisson, W. B., Storer, T., Blyth, A., Grispos, G., & Campbell, M. (2016). In the wild residual data research and privacy. arXiv preprint arXiv:1610.03229.1
Mislan, R. P., & Oh, T. (2013, June). Mobile Security and Vulnerability Exploitation as a Flipped Classroom Security Curriculum. In 8th Annual Symposium on Information Assurance (ASIA’13) (p. 64). 
Scanlon, M., Du, X., & Lillis, D. (2017). EviPlant: An efficient digital forensic challenge creation, manipulation and distribution solution. Digital Investigation, 20, S29-S36. 
Wan, Z., Nelson, A. J., Li, T., Long, D. D., & Hospodor, A. (2012). Computer Hard Drive Geolocation by HTTP Feature Extraction. 
Scholtz, J. Towards an Automated Digital Data Forensic Model with specific reference to Investigation Processes A Survey of Actual and Desirable Practice (Doctoral dissertation, Auckland University of Technology). 
Beverly, R., Rowe, N. C., Yannakogeorgos, P., & Garfinkel, S. L. (2011). Challenges in Monitoring Cyberarms Compliance. 
YANNAKOGEORGOS, P. A. (2013). CHALLENGES IN MONITORING CYBERARIvIS COMPLIANCE. Conflict and Cooperation in Cyberspace: The Challenge to National Security, 81. 
Garfinkel, S. L. (2013). Finding privacy leaks and stolen data with bulk data analysis and optimistic decoding. 
Beverly, R., Rowe, N. C., Yannakogeorgos, P., & Garfinkel, S. L. (2011). Steps towards Monitoring Cyberarms Compliance. 
McClelland, D. (2013). A Forensic Triage Methodology for the Automated Classification of Digital Devices based on Feature Manipulation Techniques. 
Glisson, W. B., Storer, T., Mayall, G., Moug, I., & Grispos, G. (2011). Electronic retention: what does your mobile phone reveal about you?. International Journal of Information Security, 10(6), 337-349.28
Rowe, N. C., & Schwamm, R. (2014). Effects of the Factory Reset on Mobile Devices. 
Parker-Wood, A., Garfinkel, S. L., Huynh, D., & Migletz, J. (2010). An Automated Solution to the Multiuser Carved Data Ascription Problem. 
Nelson, A. J. (2016). Software signature derivation from sequential digital forensic analysis. 
Garfinkel, S. L. (2010). An Automated Solution to the Multi-User Carved Data Ascription Problem Simson L. Garfinkel, Aleatha Parker-Wood, Daniel Huynh and James Migletz. 
Garfinkel, S. L., Foster, K., Young, J., & Fairbanks, K. (2013). Bulk Data Analysis With Optimistic Decompression and Sector Hashing. 
Glisson, W. B., Storer, T., Mayall, G., Moug, I., & Grispos, G. DRAFT PAPER FOR COMMENT. 
Henderson, G. (2013). Triage visualization for digital media exploitation (Doctoral dissertation, Monterey, California: Naval Postgraduate School).1
Green, J. L. (2016). Constructing social networks from secondary storage with bulk analysis tools (Doctoral dissertation, Monterey, California: Naval Postgraduate School).1
Parker-Wood, A., Long, D. D., Miller, E. L., Seltzer, M., & Tunkelang, D. (2012). Making sense of file systems through provenance and rich metadata. University of California, Santa Cruz, Tech. Rep. UCSC-SSRC-12-01.9
Schwamm, R. (2014). Effectiveness of the factory reset on a mobile device (Doctoral dissertation, Monterey, California: Naval Postgraduate School).1
Gutierrez-Villarreal, F. J. (2015). Improving sector hash carving with rule-based and entropy-based non-probative block filters (Doctoral dissertation, Monterey, California: Naval Postgraduate School). 
Noel III, G. E. (2013). Image Annotation and Topic Extraction Using Super-Word Latent Dirichlet Allocation (No. AFIT-ENG-DS-13-S-03). AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH SCHOOL OF ENGINEERING AND MANAGEMENT. 
김민서, & 이상진. (2015). 윈도우 포렌식 도구의 검증용 데이터 세트의 개발. 정보보호학회논문지, 25(6), 1421-1433. 
Bruaene, J. V. (2016). Large scale cross-drive correlation of digital media (Doctoral dissertation, Monterey, California: Naval Postgraduate School).   
  • No labels