The art of memory forensics: detecting malware and threats in windows, linux, and Mac memory MH Ligh, A Case, J Levy, A Walters John Wiley & Sons, 2014 | 389 | 2014 |
The art of memory forensics MH Ligh, A Case, J Levy, A Walters Indianapolis, ID: Wiley, 2014 | 389* | 2014 |
Acquisition and analysis of volatile memory from android devices J Sylve, A Case, L Marziale, GG Richard Digital Investigation 8 (3), 175-184, 2012 | 199 | 2012 |
FACE: automated digital evidence discovery and correlation. Digit. Investig. 5 A Case, A Cristina, L Marziale, GG Richard, V Roussev S65–S75, 2008 | 171* | 2008 |
FACE: Automated digital evidence discovery and correlation A Case, A Cristina, L Marziale, GG Richard, V Roussev digital investigation 5, S65-S75, 2008 | 163 | 2008 |
Memory forensics: The path forward A Case, GG Richard Digital Investigation 20, 23-33, 2017 | 147 | 2017 |
Dynamic recreation of kernel data structures for live forensics A Case, L Marziale, GG Richard Digital Investigation 7, S32-S40, 2010 | 59 | 2010 |
Detecting objective-C malware through memory forensics A Case, GG Richard Digital Investigation 18, S3-S10, 2016 | 36 | 2016 |
In lieu of swap: Analyzing compressed RAM in Mac OS X and Linux GG Richard, A Case Digital Investigation 11, S3-S12, 2014 | 33 | 2014 |
{DroidScraper}: A Tool for Android {In-Memory} Object Recovery and Reconstruction A Ali-Gombe, S Sudhakaran, A Case, GG Richard III 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 28 | 2019 |
Memory forensics and the windows subsystem for linux N Lewis, A Case, A Ali-Gombe, GG Richard III Digital Investigation 26, S3-S11, 2018 | 28 | 2018 |
Hooktracer: Automatic detection and analysis of keystroke loggers using memory forensics A Case, RD Maggio, M Firoz-Ul-Amin, MM Jalalzai, A Ali-Gombe, M Sun, ... Computers & Security 96, 101872, 2020 | 23 | 2020 |
Treasure and tragedy in kmem_cache mining for live forensics investigation A Case, L Marziale, C Neckar, GG Richard digital investigation 7, S41-S47, 2010 | 23 | 2010 |
Advancing Mac OS X rootkit detection A Case, GG Richard Digital Investigation 14, S25-S33, 2015 | 22 | 2015 |
HookTracer: a system for automated and accessible API hooks analysis A Case, MM Jalalzai, M Firoz-Ul-Amin, RD Maggio, A Ali-Gombe, M Sun, ... Digital Investigation 29, S104-S112, 2019 | 18 | 2019 |
Gaslight: A comprehensive fuzzing architecture for memory forensics frameworks A Case, AK Das, SJ Park, JR Ramanujam, GG Richard Digital Investigation 22, S86-S93, 2017 | 17 | 2017 |
Memory analysis of. net and. net core applications M Manna, A Case, A Ali-Gombe, GG Richard III Forensic Science International: Digital Investigation 42, 301404, 2022 | 15 | 2022 |
Memory analysis of the dalvik (android) virtual machine A Case Retrieved from, 2011 | 13 | 2011 |
Memory analysis of macos page queues A Case, RD Maggio, M Manna, GG Richard III Forensic Science International: Digital Investigation 33, 301004, 2020 | 10 | 2020 |
Modern macOS userland runtime analysis M Manna, A Case, A Ali-Gombe, GG Richard III Forensic Science International: Digital Investigation 38, 301221, 2021 | 8 | 2021 |