Nicole Beebe

Orcid: 0000-0002-0151-1617

According to our database1, Nicole Beebe authored at least 41 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Virtual reality for improving cyber situational awareness in security operations centers.
Comput. Secur., September, 2023

Blockchain Use Case in Ballistics and Crime Gun Tracing and Intelligence: Toward Overcoming Gun Violence.
ACM Trans. Manag. Inf. Syst., March, 2023

Nondestructive Data Acquisition Methodology for IoT Devices: A Case Study on Amazon Echo Dot Version 2.
IEEE Internet Things J., March, 2023

Towards Targeted Obfuscation of Adversarial Unsafe Images using Reconstruction and Counterfactual Super Region Attribution Explainability.
Proceedings of the 32nd USENIX Security Symposium, 2023

2020
Detecting Internet of Things attacks using distributed deep learning.
J. Netw. Comput. Appl., 2020

IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai Botnet Servers.
Digit. Investig., 2020

The dark triad and insider threats in cyber security.
Commun. ACM, 2020

The Impact of Power Imbalance on Cyberbullying: the Role of Bystanders Intervention.
Proceedings of the 41st International Conference on Information Systems, 2020

2019
Cooperative unmanned aerial vehicles with privacy preserving deep vision for real-time object identification and tracking.
J. Parallel Distributed Comput., 2019

How Do I Share My IoT Forensic Experience With the Broader Community? An Automated Knowledge Sharing IoT Forensic Platform.
IEEE Internet Things J., 2019

Frameup: An incriminatory attack on Storj: A peer to peer blockchain enabled distributed storage system.
Digit. Investig., 2019

2018
Are Your Neighbors Swingers or Kinksters? Feeld App Forensic Analysis.
Proceedings of the 17th IEEE International Conference On Trust, 2018

AI Thinking for Cloud Education Platform with Personalized Learning.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Cyberbullying: Investigating the Roles of Power and Communication Medium.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
Insider Threat Detection Using Time-Series-Based Raw Disk Forensic Analysis.
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017

2016
An Empirical Examination of an Agile Contingent Project/Method Fit Model.
Commun. Assoc. Inf. Syst., 2016

Data Type Classification: Hierarchical Class-to-Type Modeling.
Proceedings of the Advances in Digital Forensics XII, 2016

Exploring a Systematic Approach to Malware Threat Assessment.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

Extending Web Mining to Digital Forensics Text Mining.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2015
The Dark Side of the Insider: Detecting the Insider Threat through Examination of Dark Triad Personality Traits.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

2014
Ranking algorithms for digital forensic string search hits.
Digit. Investig., 2014

Clustering digital forensic string search output.
Digit. Investig., 2014

Framing Information Security Budget Requests to Influence Investment Decisions.
Commun. Assoc. Inf. Syst., 2014

2013
Sceadan: Using Concatenated N-Gram Vectors for Improved File and Data Type Classification.
IEEE Trans. Inf. Forensics Secur., 2013

2012
Prospect Theory and Information Security Investment Decisions.
Proceedings of the 18th Americas Conference on Information Systems, 2012

2011
Post-retrieval search hit clustering to improve information retrieval effectiveness: Two digital forensics case studies.
Decis. Support Syst., 2011

2010
Improving Organizational Information Security Strategy via Meso-Level Application of Situational Crime Prevention to the Risk Management Process.
Commun. Assoc. Inf. Syst., 2010

2009
Digital forensic implications of ZFS.
Digit. Investig., 2009

Digital Forensic Research: The Good, the Bad and the Unaddressed.
Proceedings of the Advances in Digital Forensics V, 2009

Examination of Organizational Information Security Strategy: A Pilot Study.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2007
Digital forensic text string searching: Improving information retrieval effectiveness by thematically clustering search results.
Digit. Investig., 2007

A New Process Model for Text String Searching.
Proceedings of the Advances in Digital Forensics III, 2007

2006
A Review of: "<i>Real Digital Forensics: Computer Security and Incident Response</i>. By Keith J. Jones, Richard Bejtlich, and Curtis W. Rose".
J. Digit. Forensic Pract., 2006

Moral intensity and ethical decision-making: a contextual extension.
Data Base, 2006

Digital Forensics Curriculum Development: Identification of Knowledge Domains Learning Objectives and Core Concepts.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

A Model for Predicting Hacker Behavior.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

2005
A hierarchical, objectives-based framework for the digital investigations process.
Digit. Investig., 2005

Dealing with Terabyte Datasets in Digital Investigations.
Proceedings of the Advances in Digital Forensics, 2005

An Empirical Investigation of the Impact of Data Quality and its Antecedents on Data Warehousing.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

2004
Integrating Security and Privacy Issues in System Design.
Proceedings of the Security In Information Systems, 2004

Web Services Security: Proposed Model for Content Delivery Assurance in a Low Trust Scenario.
Proceedings of the 10th Americas Conference on Information Systems, 2004


  Loading...