David A. Dampier

Orcid: 0000-0003-2333-206X

According to our database1, David A. Dampier authored at least 31 papers between 1994 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
What Do Developers Reply To? An Empirical Study of the Top Unmanned Aerial Vehicles (UAVs) Apps (S).
Proceedings of the 33rd International Conference on Software Engineering and Knowledge Engineering, 2021

YouTube Monetization and Censorship by Proxy: A Machine Learning Prospective.
Proceedings of the 12th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2021) / The 11th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2021), 2021

2020
Categorization and Organization of Database Forensic Investigation Processes.
IEEE Access, 2020

2015
Characteristics of Malicious DLLs in Windows Memory.
Proceedings of the Advances in Digital Forensics XI, 2015

2014
Forensicloud: An Architecture for Digital Forensic Analysis in the Cloud.
J. Cyber Secur. Mobil., 2014

2013
Evaluation of the Semi-automated Crime-Specific Digital Triage Process Model.
Proceedings of the Advances in Digital Forensics IX, 2013

2012
Implementing The Automated Phases Of The Partially-Automated Digital Triage Process Model.
J. Digit. Forensics Secur. Law, 2012

Research toward a Partially-Automated, and Crime Specific Digital Triage Process Model.
Comput. Inf. Sci., 2012

Teaching Hypervisor Design, Implementation, and Control to Undergraduate Computer Science and Computer Engineering Students.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

A Theoretical Process Model for Smartphones.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

2010
Structured Forensics Examination Planning with Domain Modeling: A Report of Three Experiment Trials.
J. Digit. Forensic Pract., 2010

Methods of Information Hiding and Detection in File Systems.
Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010

A Platform Independent Process Model for Smartphones Based on Invariants.
Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010

2009
Outreach, Teaching and Research Facilitated by a Forensics Training Center in Direct Support of Public Safety and Criminal Justice.
Int. J. Comput. Their Appl., 2009

Concept Mapping for Digital Forensic Investigations.
Proceedings of the Advances in Digital Forensics V, 2009

A Discovery Learning Approach to Information Assurance Education.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

2008
A Comparison of Forensic Hard Drive Imagers: A Time Analysis Comparison Between the ICS Image MASSter-Solo III and the Logicube Talon.
J. Digit. Forensic Pract., 2008

Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization.
Proceedings of the 5th International Workshop on Visualization for Computer Security, 2008

Time Analysis of Hard Drive Imaging Tools.
Proceedings of the Advances in Digital Forensics IV, 2008

2007
The Development of a University-Based Forensics Training Center as a Regional Outreach and Service Activity.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Digital Forensics--State of the Science and Foundational Research Activity.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Support for Computer Forensics Examination Planning with Domain Modeling: A Report of One Experiment Trial.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

2005
Unifying Computer Forensics Modeling Approaches: A Software Engineering Perspective.
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005

Preparing for Large-Scale Investigations with Case Domain Modeling.
Proceedings of the Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop, 2005

2004
Experiments in hiding data inside the file structure of common office documents: a stegonography application.
Proceedings of the Intenational Symposium on Information and Communication Technologies, 2004

Knowledge discovery and experience modeling in computer forensics media analysis.
Proceedings of the Intenational Symposium on Information and Communication Technologies, 2004

2003
Change-Merging of Psdl Abstract Data Types.
Trans. SDPS, 2003

2000
Teaching Scientific Method for Real-Time Software Engineering.
Proceedings of the Thirteenth Conference on Software Engineering Education and Training, 2000

1999
A Real-Time Version of SequenceL.
Ann. Softw. Eng., 1999

1996
Software Merge: Combining Changes to Decompositions.
J. Syst. Integr., 1996

1994
Automated merging of software prototypes.
J. Syst. Integr., 1994


  Loading...