The Sleuth Kit (www.sleuthkit.org/sleuthkit), 2013. ,
Forensic corpora, a challenge for forensic research, unpublished manuscript, 2007. ,
Lessons learned writing digital forensics tools and managing a 30 TB digital evidence corpus, Digital Investigation, pp.80-89, 2012. ,
Bringing science to digital forensics with standardized forensic corpora, Digital Investigation, pp.2-11, 2009. ,
DOI : 10.1016/j.diin.2009.06.016
Face Recognition Homepage, Zagreb, Croatia (www.face-rec, p.2013 ,
Introducing the Enron Corpus, presented at the First Conference on Email and Anti-Spam, 2004. ,
The Enron Corpus: A New Dataset for Email Classification Research, Proceedings of the Fifteenth European Conference on Machine Learning, pp.217-226, 2004. ,
DOI : 10.1007/978-3-540-30115-8_22
Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, pp.12-26, 2000. ,
DOI : 10.1109/DISCEX.2000.821506
The 1999 DARPA off-line intrusion detection evaluation, Computer Networks, vol.34, issue.4, pp.579-595, 2000. ,
DOI : 10.1016/S1389-1286(00)00139-0
A Synthetic Fraud Data Generation Methodology, Proceedings of the Fourth International Conference on Information and Communications Security, pp.265-277, 2002. ,
DOI : 10.1007/3-540-36159-6_23
Synthesizing test data for fraud detection systems, Proceedings of the Nineteenth Annual Computer Security Applications Conference, pp.384-394, 2003. ,
Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory, ACM Transactions on Information and System Security, vol.3, issue.4, pp.262-294, 2000. ,
DOI : 10.1145/382912.382923
The Forensic Image Generator Generator (Forensig2), 2009 Fifth International Conference on IT Security Incident Management and IT Forensics, pp.78-93, 2009. ,
DOI : 10.1109/IMF.2009.8
Evaluating the Forensic Image Generator Generator, Proceedings of the Third International Conference on Digital Forensics and Cyber Crime, pp.238-252, 2011. ,
DOI : 10.1007/978-3-642-35515-8_20
MORPH: A Longitudinal Image Database of Normal Adult Age-Progression, 7th International Conference on Automatic Face and Gesture Recognition (FGR06), pp.341-345, 2006. ,
DOI : 10.1109/FGR.2006.78
FaceHash: Face detection and robust hashing, presented at the Fifth International Conference on Digital Forensics and Cyber Crime, 2013. ,
MemCorp: An Open Data Corpus for Memory Analysis, 2011 44th Hawaii International Conference on System Sciences, 2011. ,
DOI : 10.1109/HICSS.2011.308
The Volatility Framework (code.google.com, p.2014 ,
The Global Intelligence Files (wikileaks.org/the-gif iles.html), 2013. ,
Creating realistic corpora for security and forensic education, Proceedings of the ADFSL Conference on Digital Forensics, Security and Law, 2011. ,
3LSPG: Forensic Tool Evaluation by Three Layer Stochastic Process-Based Generation of Data, Proceedings of the Fourth International Conference on Computational Forensics, pp.200-211, 2010. ,
DOI : 10.1007/3-540-36159-6_23
Model-Based Generation of Synthetic Disk Images for Digital Forensic Tool Testing, 2013 International Conference on Availability, Reliability and Security, pp.498-505, 2013. ,
DOI : 10.1109/ARES.2013.65
Synthetic Data Creation for Forensic Tool Testing: Improving Performance of the 3LSPG Framework, 2012 Seventh International Conference on Availability, Reliability and Security, pp.613-619, 2012. ,
DOI : 10.1109/ARES.2012.46