A novel anti-forensic technique for the Android OS, Proceedings of the International Conference on Broadband and Wireless Computing, Communications and Applications, pp.380-385, 2011. ,
Research trends in digital forensic science: An empirical analysis of published research, Proceedings of the Fourth International Conference on Digital Forensics and Cyber Crime, pp.144-157, 2012. ,
On the role of filesystem metadata in digital forensics, Digital Investigation, vol.1, issue.4, pp.298-309, 2004. ,
File System Forensic Analysis, Pearson Education, 2005. ,
Digital stratigraphy: Contextual analysis of filesystem traces in forensic science, Journal of Forensic Sciences, vol.63, issue.5, pp.1383-1391, 2018. ,
, Anti-forensics: Furthering digital forensic science through a new, extended, granular taxonomy, Digital Investigation, vol.18, pp.66-75, 2016.
AFEIC: Advanced forensic Ext4 inode carving, Digital Investigation, vol.20, pp.83-91, 2017. ,
An analysis of Ext4 for digital forensics, Digital Investigation, vol.9, pp.118-130, 2012. ,
Forensic implications of Ext4, Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, 2010. ,
Catch me, if you can, presented at Black Hat Japan, 2005. ,
Anti-forensics: Techniques, detection and countermeasures, Proceedings of the Second International Conference on i-Warfare and Security, pp.77-84, 2007. ,
Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem, Digital Investigation, vol.3, pp.44-49, 2006. ,
Further Forensicating of Windows Subsystem for Linux, pp.1234-1240, 2017. ,
Following the breadcrumbs: Timestamp pattern identification for cloud forensics, Digital Investigation, vol.24, pp.79-94, 2018. ,
The new Ext4 filesystem: Current status and future plans, Proceedings of the Linux Symposium, vol.2, pp.21-34, 2007. ,
, Memory forensics and the Windows Subsystem for Linux, Digital Investigation, vol.26, pp.3-11, 2018.
, Anti-forensics: The coming wave in digital forensics, poster presentation at the Seventh Annual CERIAS Information Security Symposium, 2006.
, , vol.2, 2017.
Program execution analysis in Windows: A study of data sources, their formats and comparison of forensic capability, Computers and Security, vol.74, pp.94-114, 2018. ,
Ext4 Disk Layout (www.ext4.wiki.kernel.org/index. php/Ext4_Disk_Layout), 2019. ,