Analytic forensics reading

  1. FACE: Automated Digital Evidence Discovery and Correlation. Andrew Case et al. Proceedings of the Eighth Annual DFRWS Conference.
  2. Visual correlation in the context of post-mortem analysis. Michael Hayoz and Ulrich Ultes-Nitsche. Proceedings of the ISSA 2008 Innovative Minds Conference.
  3. Toward Models for Forensic Analysis. Sean Peisert et al. Proceedings of the Fifth World Conference on Information Security Education (WISE), pp. 141-148, West Point, NY, June 2007.
  4. Forensics for System Administrators
  5. A Temporal Logic-Based Model for Forensic Investigation in Networked System Security
  6. Finite State Machine Approach to Digital Event Reconstruction. Pavel Gladyshev and Ahmed Patel. Digital Investigation, Elsevier.
  7. Statistical Tools for Digital Forensics. Alin C. Popescu and Hany Farid. Lecture Notes in Computer Science, 2005, Volume 3200/2005, 395-407.
  8. A Formalization of Digital Forensics. Ryan Leigland and Axel W. Krings. International Journal of Digital Evidence, 2004.
  9. An Empirical Study of Automatic Event Reconstruction Systems. Sundararaman Jeyaraman and Mike Atallah. CERIAS Tech Report 2006-20.
  10. Defining Digital Forensic Examination and Analysis Tools. Brian Carrier. Digital Forensics Research Workshop 2002.
  11. Computer Forensics In Forensics. Sean Peisert. ACM Operating Systems Review (OSR), Special Issue on Computer Forensics, 42(3), pp. 112-122, April 2008.
  12. Backtracking Intrusions. Samuel T. King and Peter M. Chen. ACM Transactions on Computer Systems, Vol. 23, No. 1, February 2005, Pages 51-76.
  13. Analysis of Computer Intrusions Using Sequences of Function Calls. Sean Peisert et al. IEEE Transactions on Dependable and Secure Computing (TDSC), 4(2), pp. 137-150, April-June 2007.

Forensic research groups in other universities

  1. The Commonwealth Center for Forensics and Society, University of Massachusetts Amherst.