Categorization and organization of database forensic investigation processes A Al-Dhaqm, S Abd Razak, DA Dampier, KKR Choo, K Siddique, ... IEEE Access 8, 112846-112858, 2020 | 54 | 2020 |
Building an information security education program RB Vaughn, DA Dampier, MB Warkentin Proceedings of the 1st annual conference on Information security curriculum …, 2004 | 53 | 2004 |
Research toward a partially-automated, and crime specific digital triage process model G Cantrell, D Dampier, YS Dandass, N Niu, C Bogen | 42 | 2012 |
WILLING, ABLE, AND UNWANTED: HIGH SCHOOL GIRLS'POTENTIAL SELVES IN COMPUTING K Kelly, DA Dampier, K Carr Journal of Women and Minorities in Science and Engineering 19 (1), 2013 | 34 | 2013 |
Preparing for Large-Scale Investigations with Case Domain Modeling. AC Bogen, DA Dampier DFRWS, 2005 | 32 | 2005 |
Methods of information hiding and detection in file systems J Davis, J MacLean, D Dampier 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital …, 2010 | 30 | 2010 |
Software merge: Combining changes to decompositions V Berzins, DA Dampier Journal of Systems Integration 6 (1), 135-150, 1996 | 29 | 1996 |
Experiments in hiding data inside the file structure of common office documents: a stegonography application G Cantrell, DD Dampier Proceedings of the 2004 international Symposium on information and …, 2004 | 26 | 2004 |
Automated merging of software prototypes DA Dampier, Luqi, V Berzins Journal of Systems Integration 4, 33-49, 1994 | 26 | 1994 |
Concept mapping for digital forensic investigations A Tanner, D Dampier Advances in Digital Forensics V: Fifth IFIP WG 11.9 International Conference …, 2009 | 24 | 2009 |
An approach for managing knowledge in digital forensic examinations AL Tanner, DA Dampier International Journal of Computer Science and Security 4 (5), 451-465, 2010 | 23 | 2010 |
Unifying computer forensics modeling approaches: a software engineering perspective AC Bogen, DA Dampier First International Workshop on Systematic Approaches to Digital Forensic …, 2005 | 23 | 2005 |
Information security system rating and ranking RB Vaughn Jr, A Sira, DA Dampier | 19 | 2002 |
A formal method for semantics-based change-merging of software prototypes DA Dampier, Dissertation supervisor (s): Valdis Berzins Naval Postgraduate School, 1994 | 16 | 1994 |
A theoretical process model for smartphones FC Dancer, DA Dampier, JM Jackson, N Meghanathan Advances in Computing and Information Technology: Proceedings of the Second …, 2013 | 15 | 2013 |
Forensicloud: An architecture for digital forensic analysis in the cloud C Miller, D Glendowne, D Dampier, K Blaylock | 14 | 2014 |
Increasing participation of women in cyber security D Dampier, K Kelly, K Carr ASEE-SE Regional Conference, Starkville, MS, 2012 | 14 | 2012 |
YouTube monetization and censorship by proxy: A machine learning prospective A Zappin, H Malik, EM Shakshuki, DA Dampier Procedia Computer Science 198, 23-32, 2022 | 12 | 2022 |
Implementing the automated phases of the partially-automated digital triage process model G Cantrell, DA Dampier Journal of Digital Forensics, Security and Law 7 (4), 5, 2012 | 12 | 2012 |
Knowledge discovery and experience modeling in computer forensics media analysis AC Bogen, DA Dampier Proceedings of the 2004 international symposium on Information and …, 2004 | 12 | 2004 |