default search action
David A. Dampier
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c21]Anthony Zappin, Haroon Malik, Elhadi M. Shakshuki, David A. Dampier:
YouTube Monetization and Censorship by Proxy: A Machine Learning Prospective. EUSPN/ICTH 2021: 23-32 - [c20]Fatma Outay, Haroon Malik, David A. Dampier:
What Do Developers Reply To? An Empirical Study of the Top Unmanned Aerial Vehicles (UAVs) Apps (S). SEKE 2021: 261-264 - 2020
- [j11]Arafat Mohammed Rashad Al-Dhaqm, Shukor Abd Razak, David A. Dampier, Kim-Kwang Raymond Choo, Kamran Siddique, Adeyemi Richard Ikuesan, Abdulhadi Alqarni, Victor R. Kebande:
Categorization and Organization of Database Forensic Investigation Processes. IEEE Access 8: 112846-112858 (2020)
2010 – 2019
- 2015
- [c19]Dae Glendowne, Cody Miller, Robert Wesley McGrew, David A. Dampier:
Characteristics of Malicious DLLs in Windows Memory. IFIP Int. Conf. Digital Forensics 2015: 149-161 - 2014
- [j10]Cody Miller, Dae Glendowne, David A. Dampier, Kendall Blaylock:
Forensicloud: An Architecture for Digital Forensic Analysis in the Cloud. J. Cyber Secur. Mobil. 3(3): 231-262 (2014) - 2013
- [c18]Gary Cantrell, David A. Dampier:
Evaluation of the Semi-automated Crime-Specific Digital Triage Process Model. IFIP Int. Conf. Digital Forensics 2013: 83-98 - 2012
- [j9]Gary Cantrell, David A. Dampier, Yoginder S. Dandass, Nan Niu, A. Chris Bogen:
Research toward a Partially-Automated, and Crime Specific Digital Triage Process Model. Comput. Inf. Sci. 5(2): 29-38 (2012) - [j8]Gary Cantrell, David A. Dampier:
Implementing The Automated Phases Of The Partially-Automated Digital Triage Process Model. J. Digit. Forensics Secur. Law 7(4): 99-116 (2012) - [c17]Frances Chevonne Dancer, David A. Dampier, Jacqueline M. Jackson, Natarajan Meghanathan:
A Theoretical Process Model for Smartphones. ACITY (3) 2012: 279-290 - [c16]Yoginder S. Dandass, Samuel T. Shannon, David A. Dampier:
Teaching Hypervisor Design, Implementation, and Control to Undergraduate Computer Science and Computer Engineering Students. HICSS 2012: 5613-5622 - 2010
- [j7]Alfred C. Bogen, David A. Dampier, Rayford B. Vaughn, Donna S. Reese, Edward B. Allen, Jeffrey C. Carver:
Structured Forensics Examination Planning with Domain Modeling: A Report of Three Experiment Trials. J. Digit. Forensic Pract. 3(1): 23-32 (2010) - [c15]F. Chevonne Thomas Dancer, David A. Dampier:
A Platform Independent Process Model for Smartphones Based on Invariants. SADFE 2010: 56-60 - [c14]Jeremy Davis, Joe MacLean, David A. Dampier:
Methods of Information Hiding and Detection in File Systems. SADFE 2010: 66-69
2000 – 2009
- 2009
- [j6]Rayford B. Vaughn, David A. Dampier:
Outreach, Teaching and Research Facilitated by a Forensics Training Center in Direct Support of Public Safety and Criminal Justice. Int. J. Comput. Their Appl. 16(2): 105-110 (2009) - [c13]Rayford B. Vaughn, David A. Dampier:
A Discovery Learning Approach to Information Assurance Education. HICSS 2009: 1-9 - [c12]April Tanner, David A. Dampier:
Concept Mapping for Digital Forensic Investigations. IFIP Int. Conf. Digital Forensics 2009: 291-300 - 2008
- [j5]Jack Wesley Riley, David A. Dampier, Rayford B. Vaughn:
A Comparison of Forensic Hard Drive Imagers: A Time Analysis Comparison Between the ICS Image MASSter-Solo III and the Logicube Talon. J. Digit. Forensic Pract. 2(2): 74-82 (2008) - [c11]Jack Wesley Riley, David A. Dampier, Rayford B. Vaughn:
Time Analysis of Hard Drive Imaging Tools. IFIP Int. Conf. Digital Forensics 2008: 335-344 - [c10]T. J. Jankun-Kelly, Josh Franck, David Wilson, Jeffrey C. Carver, David A. Dampier, J. Edward Swan II:
Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization. VizSEC 2008: 80-86 - 2007
- [c9]Rayford B. Vaughn, David A. Dampier:
Digital Forensics--State of the Science and Foundational Research Activity. HICSS 2007: 263 - [c8]Rayford B. Vaughn, David A. Dampier:
The Development of a University-Based Forensics Training Center as a Regional Outreach and Service Activity. HICSS 2007: 265 - [c7]Alfred C. Bogen, David A. Dampier, Jeffrey C. Carver:
Support for Computer Forensics Examination Planning with Domain Modeling: A Report of One Experiment Trial. HICSS 2007: 267 - 2005
- [c6]A. Chris Bogen, David A. Dampier:
Preparing for Large-Scale Investigations with Case Domain Modeling. DFRWS 2005 - [c5]A. Chris Bogen, David A. Dampier:
Unifying Computer Forensics Modeling Approaches: A Software Engineering Perspective. SADFE 2005: 27-39 - 2004
- [c4]A. Chris Bogen, David A. Dampier:
Knowledge discovery and experience modeling in computer forensics media analysis. ISICT 2004: 140-145 - [c3]Gary Cantrell, David A. Dampier:
Experiments in hiding data inside the file structure of common office documents: a stegonography application. ISICT 2004: 146-151 - 2003
- [j4]David A. Dampier, Vineet Chadha:
Change-Merging of Psdl Abstract Data Types. Trans. SDPS 7(4): 51-61 (2003) - 2000
- [c2]David A. Dampier, Ronald E. Wilson:
Teaching Scientific Method for Real-Time Software Engineering. CSEE&T 2000: 199
1990 – 1999
- 1999
- [j3]Daniel E. Cooke, David A. Dampier:
A Real-Time Version of SequenceL. Ann. Softw. Eng. 7: 157-176 (1999) - 1996
- [j2]Valdis Berzins, David A. Dampier:
Software Merge: Combining Changes to Decompositions. J. Syst. Integr. 6(1/2): 135-150 (1996) - 1994
- [j1]David A. Dampier, Luqi, Valdis Berzins:
Automated merging of software prototypes. J. Syst. Integr. 4(1): 33-49 (1994) - 1993
- [c1]David A. Dampier, Luqi, Valdis Berzins:
Automated Merging of Software Prototypes. SEKE 1993: 604-611
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint