Marcus K. Rogers

Affiliations:
  • Purdue University, West Lafayette, IN, USA


According to our database1, Marcus K. Rogers authored at least 41 papers between 2003 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Component Interface Standardization in Robotic Systems.
Proceedings of the Communication Papers of the 17th Conference on Computer Science and Intelligence Systems, 2022

Sensor Data Protection in Cyber-Physical Systems.
Proceedings of the 17th Conference on Computer Science and Intelligence Systems, 2022

2021
Unmanned Aerial Vehicle Kill Chain: Purple Teaming Tactics.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

2020
Asynchronous Forensic Investigative Approach to Recover Deleted Data from Instant Messaging Applications.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

2019
RPAS Forensic Validation Analysis Towards a Technical Investigation Process: A Case Study of Yuneec Typhoon H.
Sensors, 2019

Drone Disrupted Denial of Service Attack (3DOS): Towards an Incident Response and Forensic Analysis of Remotely Piloted Aerial Systems (RPASs).
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

2018
A comparative forensic analysis of privacy enhanced web browsers and private browsing modes of common web browsers.
Int. J. Electron. Secur. Digit. Forensics, 2018

File Toolkit for Selective Analysis & Reconstruction (FileTSAR) for Large-Scale Networks.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2015
Forensically Sound Retrieval and Recovery of Images from GPU Memory.
Proceedings of the Digital Forensics and Cyber Crime - 7th International Conference, 2015

Awareness of Scam E-Mails: An Exploratory Research Study - Part 2.
Proceedings of the Digital Forensics and Cyber Crime - 7th International Conference, 2015

2014
Using Internet Artifacts to Profile a Child Pornography Suspect.
J. Digit. Forensics Secur. Law, 2014

2013
Does deviant pornography use follow a Guttman-like progression?
Comput. Hum. Behav., 2013

2012
Applying traditional military principles to cyber warfare.
Proceedings of the 4th International Conference on Cyber Conflict, 2012

2011
Internet Child Pornography, U.S. Sentencing Guidelines, and the Role of Internet Service Providers.
Proceedings of the Digital Forensics and Cyber Crime - Third International ICST Conference, 2011

Yahoo! Messenger Forensics on Windows Vista and Windows 7.
Proceedings of the Digital Forensics and Cyber Crime - Third International ICST Conference, 2011

Results of Field Testing Mobile Phone Shielding Devices.
Proceedings of the Digital Forensics and Cyber Crime - Third International ICST Conference, 2011

Finding Forensic Information on Creating a Folder in $LogFile of NTFS.
Proceedings of the Digital Forensics and Cyber Crime - Third International ICST Conference, 2011

2010
Low Neuroticism and High Hedonistic Traits for Female Internet Child Pornography Consumers.
Cyberpsychology Behav. Soc. Netw., 2010

2009
The efficacy of cross-discipline representations for ill-defined concepts.
Proceedings of the 10th Conference on Information Technology Education, 2009

A Survey of the Legal Issues Facing Digital Forensic Experts.
Proceedings of the Advances in Digital Forensics V, 2009

SMIRK: SMS Management and Information Retrieval Kit.
Proceedings of the Digital Forensics and Cyber Crime - First International ICST Conference, 2009

2008
Measuring conceptual understanding: a case study.
Proceedings of the 9th Conference on Information Technology Education, 2008

A Novel Skin Tone Detection Algorithm for Contraband Image Analysis.
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008

Forensic Analysis of Volatile Instant Messaging.
Proceedings of the Advances in Digital Forensics IV, 2008

2007
Proceedings of the Information security management handbook, Sixth Edition., 2007

Social Engineering.
Proceedings of the Information security management handbook, Sixth Edition., 2007

iPOD Forensics Update.
Int. J. Digit. EVid., 2007

Mobile Phone Forensics Tool Testing: A Database Driven Approach.
Int. J. Digit. EVid., 2007

Preparing IAS graduates to recognize and manage complexity.
Proceedings of the 8th Conference on Information Technology Education, 2007

Breaking Down Stereotypes: A Call for an Ontological Model.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

2006
Computer Forensics Field Triage Process Model.
J. Digit. Forensics Secur. Law, 2006

Ultrablock Forensic Card Reader.
J. Digit. Forensic Pract., 2006

Hidden Disk Areas: HPA and DCO.
Int. J. Digit. EVid., 2006

Self-reported computer criminal behavior: A psychological analysis.
Digit. Investig., 2006

A two-dimensional circumplex approach to the development of a hacker taxonomy.
Digit. Investig., 2006

A cyber forensics ontology: Creating a new approach to studying cyber forensics.
Digit. Investig., 2006

2005
iPod Forensics.
Int. J. Digit. EVid., 2005

Digital Forensics: Meeting the Challenges of Scientific Evidence.
Proceedings of the Advances in Digital Forensics, 2005

Detecting Social Engineering.
Proceedings of the Advances in Digital Forensics, 2005

2004
The future of computer forensics: a needs analysis survey.
Comput. Secur., 2004

2003
The role of criminal profiling in the computer forensics process.
Comput. Secur., 2003


  Loading...