Using digital chains of custody on constrained devices to verify evidence PG Bradford, DA Ray 2007 IEEE Intelligence and Security Informatics, 8-15, 2007 | 13 | 2007 |
Developing a proactive digital forensics system DA Ray The University of Alabama, 2007 | 10 | 2007 |
An online algorithm for generating fractal hash chains applied to digital chains of custody PG Bradford, DA Ray arXiv preprint arXiv:0705.2876, 2007 | 7 | 2007 |
Models of Models: Digital Forensics and Domain-Specific Languages DA Ray, PG Bradford Third Annual Cyber Security and Information Infrastructure Research Workshop …, 2007 | 6 | 2007 |
Investigating the impact of real-world factors on internet worm propagation DA Ray, CB Ward, B Munteanu, J Blackwell, X Hong, J Li Information Systems Security: Third International Conference, ICISS 2007 …, 2007 | 6 | 2007 |
Models of models: Digital forensics and domainspecific languages P Bradford, D Ray, G Phillip Cyber Security and Information Intelligence Workshop, 2007 | 5 | 2007 |
Semantics for a domain-specific language for the digital forensics domain PG Bradford, DA Ray Proceedings of the 4th annual workshop on Cyber security and information …, 2008 | 2 | 2008 |
An integrated system for insider threat detection D Ray, P Bradford Advances in Digital Forensics III: IFIP International Conference on Digital …, 2007 | 2 | 2007 |
Finding the Change-Point in a Binary Stream with Two Unknown, but Distant, Distributions. PG Bradford, DA Ray Security and Management, 426-431, 2007 | 1 | 2007 |
Digital chains of custody DA Ray University of Alabama, 2005 | 1 | 2005 |