Nicole Beebe
Cited by
Cited by
A hierarchical, objectives-based framework for the digital investigations process
NL Beebe, JG Clark
Digital Investigation 2 (2), 147-167, 2005
Digital forensic research: The good, the bad and the unaddressed
N Beebe
Advances in Digital Forensics V: Fifth IFIP WG 11.9 International Conference …, 2009
Detecting Internet of Things attacks using distributed deep learning
GDLT Parra, P Rad, KKR Choo, N Beebe
Journal of Network and Computer Applications 163, 102662, 2020
Digital forensic text string searching: Improving information retrieval effectiveness by thematically clustering search results
NL Beebe, JG Clark
Digital investigation 4, 49-54, 2007
Dealing with terabyte data sets in digital investigations
N Beebe, J Clark
Advances in Digital Forensics: IFIP International Conference on Digital …, 2005
The dark side of the insider: detecting the insider threat through examination of dark triad personality traits
M Maasberg, J Warren, NL Beebe
2015 48th Hawaii International Conference on System Sciences, 3518-3526, 2015
Iot botnet forensics: A comprehensive digital forensic case study on mirai botnet servers
X Zhang, O Upton, NL Beebe, KKR Choo
Forensic Science International: Digital Investigation 32, 300926, 2020
Sceadan: Using concatenated n-gram vectors for improved file and data type classification
NL Beebe, LA Maddox, L Liu, M Sun
IEEE Transactions on Information Forensics and Security 8 (9), 1519-1530, 2013
Using situational crime prevention theory to explain the effectiveness of information systems security
NL Beebe, VS Rao
Proceedings of the 2005 SoftWars Conference, Las Vegas, NV, 1-18, 2005
Moral intensity and ethical decision-making: A contextual extension
T Goles, GB White, N Beebe, CA Dorantes, B Hewitt
ACM SIGMIS Database: the DATABASE for Advances in Information Systems 37 (2 …, 2006
Post-retrieval search hit clustering to improve information retrieval effectiveness: Two digital forensics case studies
NL Beebe, JG Clark, GB Dietrich, MS Ko, D Ko
Decision Support Systems 51 (4), 732-744, 2011
A new process model for text string searching
N Beebe, G Dietrich
Advances in Digital Forensics III: IFIP International Conference on Digital …, 2007
How do I share my IoT forensic experience with the broader community? An automated knowledge sharing IoT forensic platform
X Zhang, KKR Choo, NL Beebe
IEEE Internet of Things Journal 6 (4), 6850-6861, 2019
Improving organizational information security strategy via meso-level application of situational crime prevention to the risk management process
NL Beebe, VS Rao
Communications of the Association for Information Systems 26 (1), 17, 2010
AI thinking for cloud education platform with personalized learning
P Rad, M Roopaei, N Beebe, M Shadaram, Y Au
Cooperative unmanned aerial vehicles with privacy preserving deep vision for real-time object identification and tracking
SH Silva, P Rad, N Beebe, KKR Choo, M Umapathy
Journal of parallel and distributed computing 131, 147-160, 2019
Frameup: an incriminatory attack on Storj: a peer to peer blockchain enabled distributed storage system
X Zhang, J Grannis, I Baggili, NL Beebe
Digital Investigation 29, 28-42, 2019
Deepfake forensics analysis: An explainable hierarchical ensemble of weakly supervised models
SH Silva, M Bethany, AM Votto, IH Scarff, N Beebe, P Najafirad
Forensic Science International: Synergy 4, 100217, 2022
Clustering digital forensic string search output
NL Beebe, L Liu
Digital Investigation 11 (4), 314-322, 2014
The dark triad and insider threats in cyber security
M Maasberg, C Van Slyke, S Ellis, N Beebe
Communications of the ACM 63 (12), 64-80, 2020
The system can't perform the operation now. Try again later.
Articles 1–20