MFP: The Mobile Forensics Platform, International Journal of Digital Evidence, vol.2, issue.1, 2003. ,
A hierarchical, objectives-based framework for the digital investigations process, Digital Investigation, pp.147-167, 2005. ,
DOI : 10.1016/j.diin.2005.04.002
Getting physical with the digital investigation process, International Journal of Digital Evidence, vol.2, issue.2, 2003. ,
Investigation Delayed Is Justice Denied: Proposals for Expediting Forensic Examinations of Digital Evidence, Journal of Forensic Sciences, vol.3, issue.23, pp.1353-1364, 2009. ,
DOI : 10.1111/j.1556-4029.2009.01150.x
Testing the forensic soundness of forensic examination environments on bootable media, submitted for publication, 2014. ,
A general strategy for differential forensic analysis, Digital Investigation, pp.50-59, 2012. ,
DOI : 10.1016/j.diin.2012.05.003
Triage in Medicine, Part I: Concept, History, and Types, Annals of Emergency Medicine, vol.49, issue.3, pp.275-281, 2007. ,
DOI : 10.1016/j.annemergmed.2006.05.019
Measuring accuracy of automated investigation tools and procedures in digital investigations, presented at the Fifth International Conference on Digital Forensics and Cyber Crime, 2013. ,
How to triage computer evidence: Tackling Moore's law with less, Evidence Technology Magazine, vol.8, issue.2, p.2010 ,
The growing need for on-scene triage of mobile devices, Digital Investigation, pp.112-124, 2010. ,
DOI : 10.1016/j.diin.2010.03.001
An Ad Hoc Review of Digital Forensic Models, Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'07), pp.43-54, 2007. ,
DOI : 10.1109/SADFE.2007.3
An examination of digital forensic models, International Journal of Digital Evidence, vol.1, issue.3, 2002. ,
Digital Forensic Tools, IGI Global, pp.76-91, 2006. ,
DOI : 10.4018/978-1-59140-872-7.ch004
Computer Forensics Field Triage Process Model, Proceedings of the Conference on Digital Forensics, Security and Law, pp.27-40, 2006. ,
DOI : 10.15394/jdfsl.2006.1004
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.169.1878
Modeling of post-incident root cause analysis, International Journal of Digital Evidence, vol.2, issue.2, 2003. ,
Linux for Computer Investigators: Pitfalls of Mounting Filesystems (www.forensicfocus.com/linux-forensics-pit falls-of-mounting-file-systems), 2009. ,
I30 index attributes: Evidence of deleted and overwritten files, SANS Digital Forensics and Incident Response (computer-forensics.sans.org/blogntfs-i30-i ndex-attributes-evidence-of-deleted-and-overwritten-fil es), 2011. ,