Joshua James

Orcid: 0000-0003-0148-4732

Affiliations:
  • University College Dublin, Ireland


According to our database1, Joshua James authored at least 42 papers between 2009 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Medical Device Forensics.
IEEE Secur. Priv., 2022

2021
Formulating and Deploying Strength Amplification Controllers for Lower-Body Walking Exoskeletons.
Frontiers Robotics AI, 2021

2020
Preliminary Study of a Google Home Mini.
CoRR, 2020

A Feature Comparison of Modern Digital Forensic Imaging Software.
CoRR, 2020

2019
Evidence identification in IoT networks based on threat assessment.
Future Gener. Comput. Syst., 2019

2018
The Internet of Things and the Smart City: Legal challenges with digital forensics, privacy, and security.
Secur. Priv., 2018

Update Thresholds of More Accurate Time Stamp for Event Reconstruction.
CoRR, 2018

2017
Anti-Forensic Trace Detection in Digital Forensic Triage Investigations.
J. Digit. Forensics Secur. Law, 2017

Possession of Child Exploitation Material in Computer Temporary Internet Cache.
J. Digit. Forensics Secur. Law, 2017

Legislative Requirements for Cyber Peacekeeping.
J. Digit. Forensics Secur. Law, 2017

How Businesses Can Speed Up International Cybercrime Investigation.
IEEE Secur. Priv., 2017

Decision-theoretic file carving.
Digit. Investig., 2017

United Nations Digital Blue Helmets as a Starting Point for Cyber Peacekeeping.
CoRR, 2017

A Case Study of the 2016 Korean Cyber Command Compromise.
CoRR, 2017

2016
Electronic Voting Service Using Block-Chain.
J. Digit. Forensics Secur. Law, 2016

A survey of mutual legal assistance involving digital evidence.
Digit. Investig., 2016

2015
Automated inference of past action instances in digital investigations.
Int. J. Inf. Sec., 2015

Designing robustness and resilience in digital investigation laboratories.
Digit. Investig., 2015

Practical and Legal Challenges of Cloud Investigations.
CoRR, 2015

A Survey of International Cooperation in Digital Investigations.
Proceedings of the Digital Forensics and Cyber Crime - 7th International Conference, 2015

Development and Initial User Evaluation of a Virtual Crime Scene Simulator Including Digital Evidence.
Proceedings of the Digital Forensics and Cyber Crime - 7th International Conference, 2015

Cyber Peacekeeping.
Proceedings of the Digital Forensics and Cyber Crime - 7th International Conference, 2015

Prophetic goal-space planning for human-in-the-loop mobile manipulation.
Proceedings of the 15th IEEE-RAS International Conference on Humanoid Robots, 2015

2014
Multi-Stakeholder Case Prioritization in Digital Investigations.
J. Digit. Forensics Secur. Law, 2014

2013
A study of user data integrity during acquisition of Android devices.
Digit. Investig., 2013

Automated network triage.
Digit. Investig., 2013

A survey of digital forensic investigator decision processes and measurement of decisions based on enhanced preview.
Digit. Investig., 2013

Challenges with Automation in Digital Forensic Investigations
CoRR, 2013

Measuring digital crime investigation capacity to guide international crime prevention strategies.
CoRR, 2013

An Assessment Model for Cybercrime Investigation Capacity.
CoRR, 2013

Determining Training Needs for Cloud Infrastructure Investigations Using I-STRIDE.
Proceedings of the Digital Forensics and Cyber Crime - Fifth International Conference, 2013

Measuring Accuracy of Automated Parsing and Categorization Tools and Processes in Digital Investigations.
Proceedings of the Digital Forensics and Cyber Crime - Fifth International Conference, 2013

2012
Towards Automated Forensic Event Reconstruction of Malicious Code (Poster Abstract).
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Key Terms for Service Level Agreements to Support Cloud Forensics.
Proceedings of the Advances in Digital Forensics VIII, 2012

Towards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation Purposes.
Proceedings of the Digital Forensics and Cyber Crime - 4th International Conference, 2012

2011
A Novel Methodology for Malware Intrusion Attack Path Reconstruction.
Proceedings of the Digital Forensics and Cyber Crime - Third International ICST Conference, 2011

2010
A Consistency Study of the Windows Registry.
Proceedings of the Advances in Digital Forensics VI, 2010

Signature Based Detection of User Events for Post-mortem Forensic Analysis.
Proceedings of the Digital Forensics and Cyber Crime, 2010

2009
A comparative methodology for the reconstruction of digital events using windows restore points.
Digit. Investig., 2009

Using shellbag information to reconstruct user activities.
Digit. Investig., 2009

Temporal Analysis of Windows MRU Registry Keys.
Proceedings of the Advances in Digital Forensics V, 2009

Analysis of Evidence Using Formal Event Reconstruction.
Proceedings of the Digital Forensics and Cyber Crime - First International ICST Conference, 2009


  Loading...