Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Kevin D. Fairbanks
@inproceedings{DBLP:conf/ifip11-9/AgadaIJF22, author = {Omoche Cheche Agada and Ibifubara Iganibo and James Jones and Kevin D. Fairbanks}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {A Digital Body Farm for Collecting Deleted File Decay Data}, booktitle = {Advances in Digital Forensics {XVIII} - 18th {IFIP} {WG} 11.9 International Conference, Virtual Event, January 3-4, 2022, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {653}, pages = {3--20}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-10078-9\_1}, doi = {10.1007/978-3-031-10078-9\_1}, timestamp = {Thu, 14 Jul 2022 17:45:44 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/AgadaIJF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AgadaJF22, author = {Omoche Cheche Agada and James H. Jones Jr. and Kevin D. Fairbanks}, title = {The Distributed Digital Body Farm: Enabling the Analysis of Deleted File Decay Patterns}, booktitle = {{CSET} 2022: Cyber Security Experimentation and Test Workshop, Virtual Event, 8 August 2022}, pages = {111--119}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3546096.3546100}, doi = {10.1145/3546096.3546100}, timestamp = {Tue, 18 Oct 2022 12:47:08 +0200}, biburl = {https://dblp.org/rec/conf/uss/AgadaJF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uemcom/WatkinsFLYRR20, author = {Lanier A. Watkins and Kevin D. Fairbanks and Chengyu Li and Mengdi Yang and William H. Robinson and Aviel D. Rubin}, title = {A Black Box Approach to Inferring, Characterizing, and Breaking Native Device Tracking Autonomy}, booktitle = {11th {IEEE} Annual Ubiquitous Computing, Electronics {\&} Mobile Communication Conference, {UEMCON} 2020, New York City, NY, USA, October 28-31, 2020}, pages = {303--308}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/UEMCON51285.2020.9298163}, doi = {10.1109/UEMCON51285.2020.9298163}, timestamp = {Wed, 03 Feb 2021 15:37:19 +0100}, biburl = {https://dblp.org/rec/conf/uemcom/WatkinsFLYRR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SheyBWTNRF19, author = {James Shey and Justin A. Blanco and T. Owens Walker and Thomas W. Tedesso and Hau T. Ngo and Ryan N. Rakvic and Kevin D. Fairbanks}, title = {Monitoring Device Current to Characterize Trim Operations of Solid-State Drives}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {5}, pages = {1296--1306}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2018.2876835}, doi = {10.1109/TIFS.2018.2876835}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SheyBWTNRF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/MalikCSFWR17a, author = {Nikunj Malik and Jayanarayan Chandramouli and Prahlad Suresh and Kevin D. Fairbanks and Lanier A. Watkins and William H. Robinson}, title = {Using network traffic to verify mobile device forensic artifacts}, booktitle = {14th {IEEE} Annual Consumer Communications {\&} Networking Conference, {CCNC} 2017, Las Vegas, NV, USA, January 8-11, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CCNC.2017.8013425}, doi = {10.1109/CCNC.2017.8013425}, timestamp = {Tue, 12 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccnc/MalikCSFWR17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/MalikCSFWR17, author = {Nikunj Malik and Jayanarayan Chandramouli and Prahlad Suresh and Kevin D. Fairbanks and Lanier A. Watkins and William H. Robinson}, title = {Using network traffic to verify mobile device forensic artifacts}, booktitle = {14th {IEEE} Annual Consumer Communications {\&} Networking Conference, {CCNC} 2017, Las Vegas, NV, USA, January 8-11, 2017}, pages = {114--119}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CCNC.2017.7983091}, doi = {10.1109/CCNC.2017.7983091}, timestamp = {Tue, 12 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccnc/MalikCSFWR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/WalkerF17, author = {T. Owens Walker and Kevin D. Fairbanks}, title = {An off-the-shelf, low detectability, low data rate, timing-based covert channel for {IEEE} 802.11 wireless networks}, booktitle = {14th {IEEE} Annual Consumer Communications {\&} Networking Conference, {CCNC} 2017, Las Vegas, NV, USA, January 8-11, 2017}, pages = {835--840}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CCNC.2017.7983242}, doi = {10.1109/CCNC.2017.7983242}, timestamp = {Fri, 21 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/WalkerF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/i2mtc/SheyRNWTBF16, author = {James Shey and Ryan N. Rakvic and Hau T. Ngo and T. Owens Walker and Thomas W. Tedesso and Justin A. Blanco and Kevin D. Fairbanks}, title = {Inferring trimming activity of solid-state drives based on energy consumption}, booktitle = {{IEEE} International Instrumentation and Measurement Technology Conference, {I2MTC} 2016, Proceedings, Taipei, Taiwan, May 23-26, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/I2MTC.2016.7520537}, doi = {10.1109/I2MTC.2016.7520537}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/i2mtc/SheyRNWTBF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uemcom/CancliniMSWRNF16, author = {JonPaul Canclini and James McMasters and James Shey and T. Owens Walker and Ryan N. Rakvic and Hau T. Ngo and Kevin D. Fairbanks}, title = {Inferring read and write operations of solid-state drives based on energy consumption}, booktitle = {7th {IEEE} Annual Ubiquitous Computing, Electronics {\&} Mobile Communication Conference, {UEMCON} 2016, New York City, NY, USA, October 20-22, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/UEMCON.2016.7777891}, doi = {10.1109/UEMCON.2016.7777891}, timestamp = {Fri, 06 Mar 2020 10:55:16 +0100}, biburl = {https://dblp.org/rec/conf/uemcom/CancliniMSWRNF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/Fairbanks15, author = {Kevin D. Fairbanks}, editor = {Sheikh Iqbal Ahamed and Carl K. Chang and William C. Chu and Ivica Crnkovic and Pao{-}Ann Hsiung and Gang Huang and Jingwei Yang}, title = {A Technique for Measuring Data Persistence Using the Ext4 File System Journal}, booktitle = {39th Annual Computer Software and Applications Conference, {COMPSAC} Workshops 2015, Taichung, Taiwan, July 1-5, 2015}, pages = {18--23}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/COMPSAC.2015.164}, doi = {10.1109/COMPSAC.2015.164}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/Fairbanks15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/LontorfosFWR15, author = {Georgios Lontorfos and Kevin D. Fairbanks and Lanier A. Watkins and William H. Robinson}, editor = {Salil S. Kanhere and Jens T{\"{o}}lle and Soumaya Cherkaoui}, title = {Remotely inferring device manipulation of industrial control systems via network behavior}, booktitle = {40th {IEEE} Local Computer Networks Conference Workshops, {LCN} Workshops 2015, Clearwater Beach, FL, USA, October 26-29, 2015}, pages = {603--610}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/LCNW.2015.7365904}, doi = {10.1109/LCNW.2015.7365904}, timestamp = {Tue, 12 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/LontorfosFWR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/YoungFGF12, author = {Joel Young and Kristina Foster and Simson L. Garfinkel and Kevin D. Fairbanks}, title = {Distinct Sector Hashes for Target File Detection}, journal = {Computer}, volume = {45}, number = {12}, pages = {28--35}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.327}, doi = {10.1109/MC.2012.327}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/YoungFGF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Fairbanks12, author = {Kevin D. Fairbanks}, title = {An analysis of Ext4 for digital forensics}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S118--S130}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.010}, doi = {10.1016/J.DIIN.2012.05.010}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Fairbanks12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/FairbanksG12, author = {Kevin D. Fairbanks and Simson L. Garfinkel}, title = {Column: Factors Affecting Data Decay}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {2}, pages = {7--10}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1116}, doi = {10.15394/JDFSL.2012.1116}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jdfsl/FairbanksG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/te/LeeUFC11, author = {Christopher P. Lee and A. Selcuk Uluagac and Kevin D. Fairbanks and John A. Copeland}, title = {The Design of NetSecLab: {A} Small Competition-Based Network Security Lab}, journal = {{IEEE} Trans. Educ.}, volume = {54}, number = {1}, pages = {149--155}, year = {2011}, url = {https://doi.org/10.1109/TE.2010.2048215}, doi = {10.1109/TE.2010.2048215}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/te/LeeUFC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Fairbanks10, author = {Kevin D. Fairbanks}, title = {Forensic framework for honeypot analysis}, school = {Georgia Institute of Technology, Atlanta, GA, {USA}}, year = {2010}, url = {https://hdl.handle.net/1853/33977}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/basesearch/Fairbanks10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/FairbanksLO10, author = {Kevin D. Fairbanks and Christopher P. Lee and Henry L. Owen III}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Forensic implications of Ext4}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {22}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852691}, doi = {10.1145/1852666.1852691}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/FairbanksLO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/FairbanksXO09, author = {Kevin D. Fairbanks and Ying H. Xia and Henry L. Owen III}, editor = {Sheikh Iqbal Ahamed and Elisa Bertino and Carl K. Chang and Vladimir Getov and Lin Liu and Ming Hua and Rajesh Subramanyan}, title = {A Method for Historical Ext3 Inode to Filename Translation on Honeypots}, booktitle = {Proceedings of the 33rd Annual {IEEE} International Computer Software and Applications Conference, {COMPSAC} 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 2}, pages = {392--397}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/COMPSAC.2009.165}, doi = {10.1109/COMPSAC.2009.165}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/FairbanksXO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/XiaFO08, author = {Ying H. Xia and Kevin D. Fairbanks and Henry L. Owen}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {Visual Analysis of Program Flow Data with Data Propagation}, booktitle = {5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5210}, pages = {26--35}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85933-8\_3}, doi = {10.1007/978-3-540-85933-8\_3}, timestamp = {Wed, 24 Feb 2021 16:44:20 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/XiaFO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.