关注
Nicole Beebe
Nicole Beebe
在 utsa.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A hierarchical, objectives-based framework for the digital investigations process
NL Beebe, JG Clark
Digital Investigation 2 (2), 147-167, 2005
4642005
Digital forensic research: The good, the bad and the unaddressed
N Beebe
Advances in Digital Forensics V: Fifth IFIP WG 11.9 International Conference …, 2009
2622009
Detecting Internet of Things attacks using distributed deep learning
GDLT Parra, P Rad, KKR Choo, N Beebe
Journal of Network and Computer Applications 163, 102662, 2020
2592020
Digital forensic text string searching: Improving information retrieval effectiveness by thematically clustering search results
NL Beebe, JG Clark
Digital investigation 4, 49-54, 2007
1732007
Dealing with terabyte data sets in digital investigations
N Beebe, J Clark
Advances in Digital Forensics: IFIP International Conference on Digital …, 2005
1222005
The dark side of the insider: detecting the insider threat through examination of dark triad personality traits
M Maasberg, J Warren, NL Beebe
2015 48th Hawaii International Conference on System Sciences, 3518-3526, 2015
1172015
Iot botnet forensics: A comprehensive digital forensic case study on mirai botnet servers
X Zhang, O Upton, NL Beebe, KKR Choo
Forensic Science International: Digital Investigation 32, 300926, 2020
922020
Sceadan: Using concatenated n-gram vectors for improved file and data type classification
NL Beebe, LA Maddox, L Liu, M Sun
IEEE Transactions on Information Forensics and Security 8 (9), 1519-1530, 2013
872013
Using situational crime prevention theory to explain the effectiveness of information systems security
NL Beebe, VS Rao
Proceedings of the 2005 SoftWars Conference, Las Vegas, NV, 1-18, 2005
702005
Moral intensity and ethical decision-making: A contextual extension
T Goles, GB White, N Beebe, CA Dorantes, B Hewitt
ACM SIGMIS Database: the DATABASE for Advances in Information Systems 37 (2 …, 2006
632006
Post-retrieval search hit clustering to improve information retrieval effectiveness: Two digital forensics case studies
NL Beebe, JG Clark, GB Dietrich, MS Ko, D Ko
Decision Support Systems 51 (4), 732-744, 2011
612011
A new process model for text string searching
N Beebe, G Dietrich
Advances in Digital Forensics III: IFIP International Conference on Digital …, 2007
462007
How do I share my IoT forensic experience with the broader community? An automated knowledge sharing IoT forensic platform
X Zhang, KKR Choo, NL Beebe
IEEE Internet of Things Journal 6 (4), 6850-6861, 2019
442019
AI thinking for cloud education platform with personalized learning
P Rad, M Roopaei, N Beebe, M Shadaram, Y Au
412018
Improving organizational information security strategy via meso-level application of situational crime prevention to the risk management process
NL Beebe, VS Rao
Communications of the Association for Information Systems 26 (1), 17, 2010
412010
Cooperative unmanned aerial vehicles with privacy preserving deep vision for real-time object identification and tracking
SH Silva, P Rad, N Beebe, KKR Choo, M Umapathy
Journal of parallel and distributed computing 131, 147-160, 2019
362019
Frameup: an incriminatory attack on Storj: a peer to peer blockchain enabled distributed storage system
X Zhang, J Grannis, I Baggili, NL Beebe
Digital Investigation 29, 28-42, 2019
362019
Deepfake forensics analysis: An explainable hierarchical ensemble of weakly supervised models
SH Silva, M Bethany, AM Votto, IH Scarff, N Beebe, P Najafirad
Forensic Science International: Synergy 4, 100217, 2022
342022
The dark triad and insider threats in cyber security
M Maasberg, C Van Slyke, S Ellis, N Beebe
Communications of the ACM 63 (12), 64-80, 2020
322020
Clustering digital forensic string search output
NL Beebe, L Liu
Digital Investigation 11 (4), 314-322, 2014
322014
系统目前无法执行此操作,请稍后再试。
文章 1–20