A hierarchical, objectives-based framework for the digital investigations process NL Beebe, JG Clark Digital Investigation 2 (2), 147-167, 2005 | 464 | 2005 |
Digital forensic research: The good, the bad and the unaddressed N Beebe Advances in Digital Forensics V: Fifth IFIP WG 11.9 International Conference …, 2009 | 262 | 2009 |
Detecting Internet of Things attacks using distributed deep learning GDLT Parra, P Rad, KKR Choo, N Beebe Journal of Network and Computer Applications 163, 102662, 2020 | 259 | 2020 |
Digital forensic text string searching: Improving information retrieval effectiveness by thematically clustering search results NL Beebe, JG Clark Digital investigation 4, 49-54, 2007 | 173 | 2007 |
Dealing with terabyte data sets in digital investigations N Beebe, J Clark Advances in Digital Forensics: IFIP International Conference on Digital …, 2005 | 122 | 2005 |
The dark side of the insider: detecting the insider threat through examination of dark triad personality traits M Maasberg, J Warren, NL Beebe 2015 48th Hawaii International Conference on System Sciences, 3518-3526, 2015 | 117 | 2015 |
Iot botnet forensics: A comprehensive digital forensic case study on mirai botnet servers X Zhang, O Upton, NL Beebe, KKR Choo Forensic Science International: Digital Investigation 32, 300926, 2020 | 92 | 2020 |
Sceadan: Using concatenated n-gram vectors for improved file and data type classification NL Beebe, LA Maddox, L Liu, M Sun IEEE Transactions on Information Forensics and Security 8 (9), 1519-1530, 2013 | 87 | 2013 |
Using situational crime prevention theory to explain the effectiveness of information systems security NL Beebe, VS Rao Proceedings of the 2005 SoftWars Conference, Las Vegas, NV, 1-18, 2005 | 70 | 2005 |
Moral intensity and ethical decision-making: A contextual extension T Goles, GB White, N Beebe, CA Dorantes, B Hewitt ACM SIGMIS Database: the DATABASE for Advances in Information Systems 37 (2 …, 2006 | 63 | 2006 |
Post-retrieval search hit clustering to improve information retrieval effectiveness: Two digital forensics case studies NL Beebe, JG Clark, GB Dietrich, MS Ko, D Ko Decision Support Systems 51 (4), 732-744, 2011 | 61 | 2011 |
A new process model for text string searching N Beebe, G Dietrich Advances in Digital Forensics III: IFIP International Conference on Digital …, 2007 | 46 | 2007 |
How do I share my IoT forensic experience with the broader community? An automated knowledge sharing IoT forensic platform X Zhang, KKR Choo, NL Beebe IEEE Internet of Things Journal 6 (4), 6850-6861, 2019 | 44 | 2019 |
AI thinking for cloud education platform with personalized learning P Rad, M Roopaei, N Beebe, M Shadaram, Y Au | 41 | 2018 |
Improving organizational information security strategy via meso-level application of situational crime prevention to the risk management process NL Beebe, VS Rao Communications of the Association for Information Systems 26 (1), 17, 2010 | 41 | 2010 |
Cooperative unmanned aerial vehicles with privacy preserving deep vision for real-time object identification and tracking SH Silva, P Rad, N Beebe, KKR Choo, M Umapathy Journal of parallel and distributed computing 131, 147-160, 2019 | 36 | 2019 |
Frameup: an incriminatory attack on Storj: a peer to peer blockchain enabled distributed storage system X Zhang, J Grannis, I Baggili, NL Beebe Digital Investigation 29, 28-42, 2019 | 36 | 2019 |
Deepfake forensics analysis: An explainable hierarchical ensemble of weakly supervised models SH Silva, M Bethany, AM Votto, IH Scarff, N Beebe, P Najafirad Forensic Science International: Synergy 4, 100217, 2022 | 34 | 2022 |
The dark triad and insider threats in cyber security M Maasberg, C Van Slyke, S Ellis, N Beebe Communications of the ACM 63 (12), 64-80, 2020 | 32 | 2020 |
Clustering digital forensic string search output NL Beebe, L Liu Digital Investigation 11 (4), 314-322, 2014 | 32 | 2014 |