Gary C. Kessler

According to our database1, Gary C. Kessler authored at least 41 papers between 1994 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Disconnects of Specialized Mobile Digital Forensics within the Generalized Field of Digital Forensic Science.
Int. J. Interdiscip. Telecommun. Netw., 2018

A Study of Forensic Imaging to Evaluate "Unsanitized" Destination Storage Media.
Int. J. Interdiscip. Telecommun. Netw., 2018

2017
Exploring Myths in Digital Forensics: Separating Science From Ritual.
Int. J. Interdiscip. Telecommun. Netw., 2017

Using Journals to Assess Non-STEM Student Learning in STEM Courses: A Case Study in Cybersecurity Education.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Implications of Emerging Technologies to Incident Handling and Digital Forensic Strategies: A Routine Activity Theory.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

2016
The Impact of SHA-1 File Hash Collisions On Digital Forensic Imaging: A Follow-up Experiment.
J. Digit. Forensics Secur. Law, 2016

The Impact of MD5 File Hash Collisions On Digital Forensic Imaging.
J. Digit. Forensics Secur. Law, 2016

2014
An Analysis of Forensic Imaging in the Absence of Write-Blockers.
J. Digit. Forensics Secur. Law, 2014

Introduction to IS Education and Training Minitrack.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

A Proposed Curriculum in Cybersecurity Education Targeting Homeland Security Students.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

2013
Technology Corner: Calculating the Number of Android Lock Patterns: An Unfinished Study in Number Theory.
J. Digit. Forensics Secur. Law, 2013

2012
Identifying trace evidence in data wiping application software.
J. Digit. Forensics Secur. Law, 2012

Advancing the Science of Digital Forensics.
Computer, 2012

Information Security: New Threats or Familiar Problems?
Computer, 2012

2011
Judges Awareness, Understanding, and Application of Digital Evidence.
J. Digit. Forensics Secur. Law, 2011

An Overview of Steganography.
Adv. Comput., 2011

2010
Book Review: Digital Forensic Evidence Examination (2nd ed.).
J. Digit. Forensics Secur. Law, 2010

An Online Graduate Program in Digital Investigation Management: Pedagogy and Overview.
J. Digit. Forensic Pract., 2010

<i>Windows Forensic Analysis DVD Toolkit</i>, 2nd edition. By Harlan Carvey.
J. Digit. Forensic Pract., 2010

<i>Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility</i>. By A. Jones and C. Valli.
J. Digit. Forensic Pract., 2010

The growing need for on-scene triage of mobile devices.
Digit. Investig., 2010

2009
Book Review: Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions.
J. Digit. Forensics Secur. Law, 2009

Bluetooth Hacking: A Case Study.
J. Digit. Forensics Secur. Law, 2009

Multidisciplinary learning using mock trials.
Int. J. Electron. Secur. Digit. Forensics, 2009

2008
Book Review: Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit.
J. Digit. Forensics Secur. Law, 2008

Book Review: The dotCrime Manifesto: How to Stop Internet Crime.
J. Digit. Forensics Secur. Law, 2008

Book Review: Challenges to Digital Forensic Evidence.
J. Digit. Forensics Secur. Law, 2008

On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners.
J. Digit. Forensic Pract., 2008

Pedagogy and Overview of a Graduate Program in Digital Investigation Management.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

2007
Book Review: Conquest in Cyberspace: National Security and Information Warfare.
J. Digit. Forensics Secur. Law, 2007

Book Review: No Place To Hide.
J. Digit. Forensics Secur. Law, 2007

Online Education in Computer and Digital Forensics: A Case Study.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

2006
The Design of an Undergraduate Degree Program in Computer & Digital Forensics.
J. Digit. Forensics Secur. Law, 2006

Book Review: Digital Crime and Forensic Science in Cyberspace.
J. Digit. Forensics Secur. Law, 2006

A Review of: "<i>Real Digital Forensics: Computer Security and Incident Response</i>. By Keith J. Jones, Richard Bejtlich, and Curtis W. Rose".
J. Digit. Forensic Pract., 2006

Cognition, education, and communication technology, P. Gärdenfors, P. Johansson (Eds.). Lawrence Erlbaum Associates, Mahwah (NJ) (2005), 294 pp., US$34.50, ISBN: 0-8058-4280-2 (paper).
Internet High. Educ., 2006

1999
The Web Can Be Suitable for Learning.
Computer, 1999

1997
A Primer On Internet and TCP/IP Tools and Utilities.
RFC, June, 1997

The Internet Engineering Task ForceHistory, Background, and Security Guidelines.
Inf. Secur. J. A Glob. Perspect., 1997

The portrayal of the network in the popular media, or what the non-techie person-on-the-street must think of us!
IEEE Commun. Mag., 1997

1994
A Primer On Internet and TCP/IP Tools.
RFC, December, 1994


  Loading...