Placing the Suspect Behind the Keyboard B Shavers eForensics Magazine 2 (9), 2013 | 33* | 2013 |
A Discussion of Virtual Machines Related to Forensics Analysis B Shavers Virtual Forensics, 1-35, 2008 | 21 | 2008 |
Hiding behind the keyboard: uncovering covert communication methods with forensic analysis B Shavers, J Bair Syngress, 2016 | 17 | 2016 |
X-Ways Forensics Practitioner’s Guide B Shavers, E Zimmerman Newnes, 2013 | 10 | 2013 |
Who is the digital forensic expert and what is their expertise? G Horsman, B Shavers Wiley Interdisciplinary Reviews: Forensic Science 4 (5), e1453, 2022 | 6 | 2022 |
Chapter 6-Cryptography and Encryption B Shavers, J Bair Hiding Behind the Keyboard, 133-151, 2016 | 6 | 2016 |
Digital Identity B Shavers, J Bair Hiding behind the Keyboard: Uncovering Covert Communication Methods with …, 2016 | 6 | 2016 |
The Tor browser B Shavers, J Bair Hiding behind the keyboard. Syngress, Boston, 11-34, 2016 | 5 | 2016 |
Virtual forensics: a discussion of virtual machines related to forensic analysis B Shavers Retrieved August 15, 2010, 2008 | 5 | 2008 |
Cybercrime investigation case studies: An excerpt from placing the suspect behind the keyboard B Shavers Newnes, 2012 | 4 | 2012 |
Virtual forensics B Shavers Retrieved May 4, 2010, 2008 | 3 | 2008 |
Antiforensics B Shavers, J Bair Hiding Behind the Keyboard, 153-172, 2016 | 2 | 2016 |
Fostering an “investigating mindset”: Why is it important in digital forensic science education? G Horsman, E Ryser, B Shavers Wiley Interdisciplinary Reviews: Forensic Science 6 (3), e1511, 2024 | 1 | 2024 |
Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard B Shavers Newnes, 2013 | 1 | 2013 |
DFIR Investigative Mindset B Shavers, L Harris | | 2024 |
Hiding Behind the Keyboard: Using forensic analysis to uncover covert communications B Shavers, J Bair Syngress, 2016 | | 2016 |