Follow
Kevin D. Fairbanks
Kevin D. Fairbanks
Principal Cyber Operations Engineer, MITRE
Verified email at fairbanksphd.com
Title
Cited by
Cited by
Year
An Analysis of Ext4 for Digital Forensics
KD Fairbanks
DFRWS 2012 Conference 9 (Supplement), Pages S118-S130, 2012
1072012
Distinct sector hashes for target file detection.
J Young, K Foster, S Garfinkel, K Fairbanks
622012
Forensic implications of ext4
KD Fairbanks, CP Lee, HL Owen III
Proceedings of the sixth annual workshop on cyber security and information …, 2010
282010
The design of NetSecLab: a small competition-based network security lab
CP Lee, AS Uluagac, KD Fairbanks, JA Copeland
IEEE Transactions on Education 54 (1), 149-155, 2010
232010
Timekeeper: a metadata archiving method for honeypot forensics
KD Fairbanks, CP Lee, YH Xia, HL Owen
2007 IEEE SMC Information Assurance and Security Workshop, 114-118, 2007
232007
Remotely Inferring Device Manipulation of Industrial Control Systems Via Network Behavior
G Lontorfos, D Fairbanks, Kevin, L Watkins, H Robinson, William
IEEE Local Computer Networks Workshops (LCN 2015); IEEE Workshop on Network …, 2015
182015
The resource usage viewpoint of industrial control system security: an inference-based intrusion detection system
R Nair, C Nayak, L Watkins, KD Fairbanks, K Memon, P Wang, ...
Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing, 195-223, 2017
172017
Using Network Traffic To Verify Mobile Device Forensic Artifacts
N Malik, J Chandramouli, P Suresh, KD Fairbanks, L Watkins, ...
IEEE CCNC 2017, 2017
172017
Inferring Read and Write Operations of Solid-State Drives Based on Energy Consumption
JP Canclini, J McMaster, J Shey, O Walker, R Rakvic, H Ngo, ...
IEEE UEMCON 2016, 2016
172016
Using Network Traffic to Remotely Identify the Type of Applications Executing on Mobile Devices
L Watkins, C Corbett, B Salazar, K Fairbanks, W Robinson
Mobile Security Technologies (MoST 2013), 2013
172013
The Science of Digital Forensics: Factors Affecting Data Decay
K Fairbanks, S Garfinkel
Journal of Digital Forensics, Security and Law 7 (2), 7-10, 2012
15*2012
Visual analysis of program flow data with data propagation
Y Xia, K Fairbanks, H Owen
International Workshop on Visualization for Computer Security, 26-35, 2008
142008
Monitoring device current to characterize trim operations of solid-state drives
J Shey, JA Blanco, O Walker, TW Tedesso, HT Ngo, R Rakvic, ...
IEEE Transactions on Information Forensics and Security 14 (5), 1296-1306, 2018
132018
A Technique for Measuring Data Persistence Using the Ext4 File System Journal
KD Fairbanks
The 39th Annual International Computers, Software & Applications Conference …, 2015
122015
Inferring Trimming Activity of Solid-State Drives Based on Energy Consumption
J Shey, R Rakvic, H Ngo, O Walkers, T Teddeso, JA Blanco, KD Fairbanks
2016 IEEE International Instrumentation and Measurement Technology Conference, 2016
112016
Inferring file system of solid state drives based on current consumption
J Melton, R Rakvic, J Shey, H Ngo, O Walker, J Blanco, D Brown, ...
2017 IEEE 7th Annual International Conference on CYBER Technology in …, 2017
102017
BlackBerry IPD parsing for open source forensics
K Fairbanks, K Atreya, H Owen
IEEE Southeastcon 2009, 195-199, 2009
102009
A program behavior matching architecture for probabilistic file system forensics
Y Xia, K Fairbanks, H Owen
ACM SIGOPS Operating systems review 42 (3), 4-13, 2008
92008
An Off-the-Shelf, Low Detectability, Low Data Rate, Timing-based Covert Channel for IEEE 802.11 Wireless Networks
O Walker, K Fairbanks
IEEE Consumer Communications & Networking Conference, 2017
62017
A method for historical Ext3 inode to filename translation on honeypots
KD Fairbanks, YH Xia, HL Owen III
2009 33rd Annual IEEE International Computer Software and Applications …, 2009
62009
The system can't perform the operation now. Try again later.
Articles 1–20