A hierarchical, objectives-based framework for the digital investigations process NL Beebe, JG Clark Digital Investigation 2 (2), 147-167, 2005 | 427 | 2005 |
Digital forensic research: The good, the bad and the unaddressed N Beebe Advances in Digital Forensics V: Fifth IFIP WG 11.9 International Conference …, 2009 | 242 | 2009 |
Digital forensic text string searching: Improving information retrieval effectiveness by thematically clustering search results NL Beebe, JG Clark Digital investigation 4, 49-54, 2007 | 167 | 2007 |
Detecting Internet of Things attacks using distributed deep learning GDLT Parra, P Rad, KKR Choo, N Beebe Journal of Network and Computer Applications 163, 102662, 2020 | 153 | 2020 |
Dealing with terabyte data sets in digital investigations N Beebe, J Clark Advances in Digital Forensics: IFIP International Conference on Digital …, 2005 | 115 | 2005 |
The dark side of the insider: detecting the insider threat through examination of dark triad personality traits M Maasberg, J Warren, NL Beebe 2015 48th Hawaii International Conference on System Sciences, 3518-3526, 2015 | 91 | 2015 |
Sceadan: Using concatenated n-gram vectors for improved file and data type classification NL Beebe, LA Maddox, L Liu, M Sun IEEE Transactions on Information Forensics and Security 8 (9), 1519-1530, 2013 | 68 | 2013 |
Using situational crime prevention theory to explain the effectiveness of information systems security NL Beebe, VS Rao Proceedings of the 2005 SoftWars Conference, Las Vegas, NV, 1-18, 2005 | 59 | 2005 |
Post-retrieval search hit clustering to improve information retrieval effectiveness: Two digital forensics case studies NL Beebe, JG Clark, GB Dietrich, MS Ko, D Ko Decision Support Systems 51 (4), 732-744, 2011 | 57 | 2011 |
Moral intensity and ethical decision-making: A contextual extension T Goles, GB White, N Beebe, CA Dorantes, B Hewitt ACM SIGMIS Database: the DATABASE for Advances in Information Systems 37 (2 …, 2006 | 53 | 2006 |
Iot botnet forensics: A comprehensive digital forensic case study on mirai botnet servers X Zhang, O Upton, NL Beebe, KKR Choo Forensic Science International: Digital Investigation 32, 300926, 2020 | 44 | 2020 |
A new process model for text string searching N Beebe, G Dietrich Advances in Digital Forensics III: IFIP International Conference on Digital …, 2007 | 44 | 2007 |
Improving organizational information security strategy via meso-level application of situational crime prevention to the risk management process NL Beebe, VS Rao Communications of the Association for Information Systems 26 (1), 17, 2010 | 38 | 2010 |
How do I share my IoT forensic experience with the broader community? An automated knowledge sharing IoT forensic platform X Zhang, KKR Choo, NL Beebe IEEE Internet of Things Journal 6 (4), 6850-6861, 2019 | 36 | 2019 |
AI thinking for cloud education platform with personalized learning P Rad, M Roopaei, N Beebe, M Shadaram, Y Au | 28 | 2018 |
Clustering digital forensic string search output NL Beebe, L Liu Digital Investigation 11 (4), 314-322, 2014 | 27 | 2014 |
Cooperative unmanned aerial vehicles with privacy preserving deep vision for real-time object identification and tracking SH Silva, P Rad, N Beebe, KKR Choo, M Umapathy Journal of parallel and distributed computing 131, 147-160, 2019 | 25 | 2019 |
Framing information security budget requests to influence investment decisions NL Beebe, DK Young, FR Chang Communications of the Association for Information Systems 35 (1), 7, 2014 | 24 | 2014 |
Customers’ personality, their perceptions, and green concern on internet banking use M Ko, R Mancha, N Beebe, HS Yoon Journal of Information Technology Management 23 (4), 21-32, 2012 | 23 | 2012 |
Frameup: an incriminatory attack on Storj: a peer to peer blockchain enabled distributed storage system X Zhang, J Grannis, I Baggili, NL Beebe Digital Investigation 29, 28-42, 2019 | 22 | 2019 |