BibTeX records: Kevin D. Fairbanks

download as .bib file

@inproceedings{DBLP:conf/ifip11-9/AgadaIJF22,
  author       = {Omoche Cheche Agada and
                  Ibifubara Iganibo and
                  James Jones and
                  Kevin D. Fairbanks},
  editor       = {Gilbert L. Peterson and
                  Sujeet Shenoi},
  title        = {A Digital Body Farm for Collecting Deleted File Decay Data},
  booktitle    = {Advances in Digital Forensics {XVIII} - 18th {IFIP} {WG} 11.9 International
                  Conference, Virtual Event, January 3-4, 2022, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {653},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-10078-9\_1},
  doi          = {10.1007/978-3-031-10078-9\_1},
  timestamp    = {Thu, 14 Jul 2022 17:45:44 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/AgadaIJF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AgadaJF22,
  author       = {Omoche Cheche Agada and
                  James H. Jones Jr. and
                  Kevin D. Fairbanks},
  title        = {The Distributed Digital Body Farm: Enabling the Analysis of Deleted
                  File Decay Patterns},
  booktitle    = {{CSET} 2022: Cyber Security Experimentation and Test Workshop, Virtual
                  Event, 8 August 2022},
  pages        = {111--119},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3546096.3546100},
  doi          = {10.1145/3546096.3546100},
  timestamp    = {Tue, 18 Oct 2022 12:47:08 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/AgadaJF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uemcom/WatkinsFLYRR20,
  author       = {Lanier A. Watkins and
                  Kevin D. Fairbanks and
                  Chengyu Li and
                  Mengdi Yang and
                  William H. Robinson and
                  Aviel D. Rubin},
  title        = {A Black Box Approach to Inferring, Characterizing, and Breaking Native
                  Device Tracking Autonomy},
  booktitle    = {11th {IEEE} Annual Ubiquitous Computing, Electronics {\&} Mobile
                  Communication Conference, {UEMCON} 2020, New York City, NY, USA, October
                  28-31, 2020},
  pages        = {303--308},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/UEMCON51285.2020.9298163},
  doi          = {10.1109/UEMCON51285.2020.9298163},
  timestamp    = {Wed, 03 Feb 2021 15:37:19 +0100},
  biburl       = {https://dblp.org/rec/conf/uemcom/WatkinsFLYRR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SheyBWTNRF19,
  author       = {James Shey and
                  Justin A. Blanco and
                  T. Owens Walker and
                  Thomas W. Tedesso and
                  Hau T. Ngo and
                  Ryan N. Rakvic and
                  Kevin D. Fairbanks},
  title        = {Monitoring Device Current to Characterize Trim Operations of Solid-State
                  Drives},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {5},
  pages        = {1296--1306},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2018.2876835},
  doi          = {10.1109/TIFS.2018.2876835},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SheyBWTNRF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/MalikCSFWR17a,
  author       = {Nikunj Malik and
                  Jayanarayan Chandramouli and
                  Prahlad Suresh and
                  Kevin D. Fairbanks and
                  Lanier A. Watkins and
                  William H. Robinson},
  title        = {Using network traffic to verify mobile device forensic artifacts},
  booktitle    = {14th {IEEE} Annual Consumer Communications {\&} Networking Conference,
                  {CCNC} 2017, Las Vegas, NV, USA, January 8-11, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CCNC.2017.8013425},
  doi          = {10.1109/CCNC.2017.8013425},
  timestamp    = {Tue, 12 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccnc/MalikCSFWR17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/MalikCSFWR17,
  author       = {Nikunj Malik and
                  Jayanarayan Chandramouli and
                  Prahlad Suresh and
                  Kevin D. Fairbanks and
                  Lanier A. Watkins and
                  William H. Robinson},
  title        = {Using network traffic to verify mobile device forensic artifacts},
  booktitle    = {14th {IEEE} Annual Consumer Communications {\&} Networking Conference,
                  {CCNC} 2017, Las Vegas, NV, USA, January 8-11, 2017},
  pages        = {114--119},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CCNC.2017.7983091},
  doi          = {10.1109/CCNC.2017.7983091},
  timestamp    = {Tue, 12 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccnc/MalikCSFWR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/WalkerF17,
  author       = {T. Owens Walker and
                  Kevin D. Fairbanks},
  title        = {An off-the-shelf, low detectability, low data rate, timing-based covert
                  channel for {IEEE} 802.11 wireless networks},
  booktitle    = {14th {IEEE} Annual Consumer Communications {\&} Networking Conference,
                  {CCNC} 2017, Las Vegas, NV, USA, January 8-11, 2017},
  pages        = {835--840},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CCNC.2017.7983242},
  doi          = {10.1109/CCNC.2017.7983242},
  timestamp    = {Fri, 21 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/WalkerF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/i2mtc/SheyRNWTBF16,
  author       = {James Shey and
                  Ryan N. Rakvic and
                  Hau T. Ngo and
                  T. Owens Walker and
                  Thomas W. Tedesso and
                  Justin A. Blanco and
                  Kevin D. Fairbanks},
  title        = {Inferring trimming activity of solid-state drives based on energy
                  consumption},
  booktitle    = {{IEEE} International Instrumentation and Measurement Technology Conference,
                  {I2MTC} 2016, Proceedings, Taipei, Taiwan, May 23-26, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/I2MTC.2016.7520537},
  doi          = {10.1109/I2MTC.2016.7520537},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/i2mtc/SheyRNWTBF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uemcom/CancliniMSWRNF16,
  author       = {JonPaul Canclini and
                  James McMasters and
                  James Shey and
                  T. Owens Walker and
                  Ryan N. Rakvic and
                  Hau T. Ngo and
                  Kevin D. Fairbanks},
  title        = {Inferring read and write operations of solid-state drives based on
                  energy consumption},
  booktitle    = {7th {IEEE} Annual Ubiquitous Computing, Electronics {\&} Mobile
                  Communication Conference, {UEMCON} 2016, New York City, NY, USA, October
                  20-22, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/UEMCON.2016.7777891},
  doi          = {10.1109/UEMCON.2016.7777891},
  timestamp    = {Fri, 06 Mar 2020 10:55:16 +0100},
  biburl       = {https://dblp.org/rec/conf/uemcom/CancliniMSWRNF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/Fairbanks15,
  author       = {Kevin D. Fairbanks},
  editor       = {Sheikh Iqbal Ahamed and
                  Carl K. Chang and
                  William C. Chu and
                  Ivica Crnkovic and
                  Pao{-}Ann Hsiung and
                  Gang Huang and
                  Jingwei Yang},
  title        = {A Technique for Measuring Data Persistence Using the Ext4 File System
                  Journal},
  booktitle    = {39th Annual Computer Software and Applications Conference, {COMPSAC}
                  Workshops 2015, Taichung, Taiwan, July 1-5, 2015},
  pages        = {18--23},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/COMPSAC.2015.164},
  doi          = {10.1109/COMPSAC.2015.164},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/Fairbanks15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/LontorfosFWR15,
  author       = {Georgios Lontorfos and
                  Kevin D. Fairbanks and
                  Lanier A. Watkins and
                  William H. Robinson},
  editor       = {Salil S. Kanhere and
                  Jens T{\"{o}}lle and
                  Soumaya Cherkaoui},
  title        = {Remotely inferring device manipulation of industrial control systems
                  via network behavior},
  booktitle    = {40th {IEEE} Local Computer Networks Conference Workshops, {LCN} Workshops
                  2015, Clearwater Beach, FL, USA, October 26-29, 2015},
  pages        = {603--610},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/LCNW.2015.7365904},
  doi          = {10.1109/LCNW.2015.7365904},
  timestamp    = {Tue, 12 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/LontorfosFWR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/YoungFGF12,
  author       = {Joel Young and
                  Kristina Foster and
                  Simson L. Garfinkel and
                  Kevin D. Fairbanks},
  title        = {Distinct Sector Hashes for Target File Detection},
  journal      = {Computer},
  volume       = {45},
  number       = {12},
  pages        = {28--35},
  year         = {2012},
  url          = {https://doi.org/10.1109/MC.2012.327},
  doi          = {10.1109/MC.2012.327},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/YoungFGF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Fairbanks12,
  author       = {Kevin D. Fairbanks},
  title        = {An analysis of Ext4 for digital forensics},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S118--S130},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.010},
  doi          = {10.1016/J.DIIN.2012.05.010},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Fairbanks12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/FairbanksG12,
  author       = {Kevin D. Fairbanks and
                  Simson L. Garfinkel},
  title        = {Column: Factors Affecting Data Decay},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {2},
  pages        = {7--10},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1116},
  doi          = {10.15394/JDFSL.2012.1116},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jdfsl/FairbanksG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/te/LeeUFC11,
  author       = {Christopher P. Lee and
                  A. Selcuk Uluagac and
                  Kevin D. Fairbanks and
                  John A. Copeland},
  title        = {The Design of NetSecLab: {A} Small Competition-Based Network Security
                  Lab},
  journal      = {{IEEE} Trans. Educ.},
  volume       = {54},
  number       = {1},
  pages        = {149--155},
  year         = {2011},
  url          = {https://doi.org/10.1109/TE.2010.2048215},
  doi          = {10.1109/TE.2010.2048215},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/te/LeeUFC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Fairbanks10,
  author       = {Kevin D. Fairbanks},
  title        = {Forensic framework for honeypot analysis},
  school       = {Georgia Institute of Technology, Atlanta, GA, {USA}},
  year         = {2010},
  url          = {https://hdl.handle.net/1853/33977},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/basesearch/Fairbanks10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/FairbanksLO10,
  author       = {Kevin D. Fairbanks and
                  Christopher P. Lee and
                  Henry L. Owen III},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Forensic implications of Ext4},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {22},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852691},
  doi          = {10.1145/1852666.1852691},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/FairbanksLO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/FairbanksXO09,
  author       = {Kevin D. Fairbanks and
                  Ying H. Xia and
                  Henry L. Owen III},
  editor       = {Sheikh Iqbal Ahamed and
                  Elisa Bertino and
                  Carl K. Chang and
                  Vladimir Getov and
                  Lin Liu and
                  Ming Hua and
                  Rajesh Subramanyan},
  title        = {A Method for Historical Ext3 Inode to Filename Translation on Honeypots},
  booktitle    = {Proceedings of the 33rd Annual {IEEE} International Computer Software
                  and Applications Conference, {COMPSAC} 2009, Seattle, Washington,
                  USA, July 20-24, 2009. Volume 2},
  pages        = {392--397},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/COMPSAC.2009.165},
  doi          = {10.1109/COMPSAC.2009.165},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/FairbanksXO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/XiaFO08,
  author       = {Ying H. Xia and
                  Kevin D. Fairbanks and
                  Henry L. Owen},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {Visual Analysis of Program Flow Data with Data Propagation},
  booktitle    = {5th International Workshop on Visualization for Computer Security,
                  VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5210},
  pages        = {26--35},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85933-8\_3},
  doi          = {10.1007/978-3-540-85933-8\_3},
  timestamp    = {Wed, 24 Feb 2021 16:44:20 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/XiaFO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics