default search action
Gary C. Kessler
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2018
- [j33]Gregory H. Carlton, Gary C. Kessler:
A Study of Forensic Imaging to Evaluate "Unsanitized" Destination Storage Media. Int. J. Interdiscip. Telecommun. Netw. 10(3): 55-61 (2018) - [j32]Gregory H. Carlton, Gary C. Kessler:
Disconnects of Specialized Mobile Digital Forensics within the Generalized Field of Digital Forensic Science. Int. J. Interdiscip. Telecommun. Netw. 10(3): 62-65 (2018) - 2017
- [j31]Gary C. Kessler, Gregory H. Carlton:
Exploring Myths in Digital Forensics: Separating Science From Ritual. Int. J. Interdiscip. Telecommun. Netw. 9(4): 1-9 (2017) - 2016
- [j30]Gary C. Kessler:
The Impact of MD5 File Hash Collisions On Digital Forensic Imaging. J. Digit. Forensics Secur. Law 11(4): 129-138 (2016) - [j29]Gary C. Kessler:
The Impact of SHA-1 File Hash Collisions On Digital Forensic Imaging: A Follow-up Experiment. J. Digit. Forensics Secur. Law 11(4): 139-148 (2016) - 2014
- [j28]Gary C. Kessler, Gregory H. Carlton:
An Analysis of Forensic Imaging in the Absence of Write-Blockers. J. Digit. Forensics Secur. Law 9(3): 51-58 (2014) - 2013
- [j27]Gary C. Kessler:
Technology Corner: Calculating the Number of Android Lock Patterns: An Unfinished Study in Number Theory. J. Digit. Forensics Secur. Law 8(4): 57-64 (2013) - 2012
- [j26]Gary C. Kessler:
Information Security: New Threats or Familiar Problems? Computer 45(2): 59-65 (2012) - [j25]Gary C. Kessler:
Advancing the Science of Digital Forensics. Computer 45(12): 25-27 (2012) - [j24]Gregory H. Carlton, Gary C. Kessler:
Identifying trace evidence in data wiping application software. J. Digit. Forensics Secur. Law 7(2): 113-142 (2012) - 2011
- [j23]Gary C. Kessler, Chet Hosmer:
An Overview of Steganography. Adv. Comput. 83: 51-107 (2011) - [j22]Gary C. Kessler:
Judges Awareness, Understanding, and Application of Digital Evidence. J. Digit. Forensics Secur. Law 6(1): 55-72 (2011) - 2010
- [j21]Richard P. Mislan, Eoghan Casey, Gary C. Kessler:
The growing need for on-scene triage of mobile devices. Digit. Investig. 6(3-4): 112-124 (2010) - [j20]Gary C. Kessler, Don A. Haggerty:
An Online Graduate Program in Digital Investigation Management: Pedagogy and Overview. J. Digit. Forensic Pract. 3(1): 11-22 (2010) - [j19]Gary C. Kessler:
Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility. By A. Jones and C. Valli. J. Digit. Forensic Pract. 3(1): 62-63 (2010) - [j18]Gary C. Kessler:
Windows Forensic Analysis DVD Toolkit, 2nd edition. By Harlan Carvey. J. Digit. Forensic Pract. 3(1): 64-66 (2010) - [j17]Gary C. Kessler:
Book Review: Digital Forensic Evidence Examination (2nd ed.). J. Digit. Forensics Secur. Law 5(2): 85-88 (2010) - 2009
- [j16]Gary C. Kessler, Robert Simpson, James Fry:
Multidisciplinary learning using mock trials. Int. J. Electron. Secur. Digit. Forensics 2(2): 141-155 (2009) - [j15]Dennis Browning, Gary C. Kessler:
Bluetooth Hacking: A Case Study. J. Digit. Forensics Secur. Law 4(2): 57-72 (2009) - [j14]Gary C. Kessler:
Book Review: Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions. J. Digit. Forensics Secur. Law 4(3): 57-60 (2009) - 2008
- [j13]Gary C. Kessler:
On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners. J. Digit. Forensic Pract. 2(1): 43-53 (2008) - [j12]Gary C. Kessler:
Book Review: Challenges to Digital Forensic Evidence. J. Digit. Forensics Secur. Law 3(1): 57-60 (2008) - [j11]Gary C. Kessler:
Book Review: The dotCrime Manifesto: How to Stop Internet Crime. J. Digit. Forensics Secur. Law 3(2): 71-74 (2008) - [j10]Gary C. Kessler:
Book Review: Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit. J. Digit. Forensics Secur. Law 3(4): 59-62 (2008) - 2007
- [j9]Gary C. Kessler:
Book Review: No Place To Hide. J. Digit. Forensics Secur. Law 2(1): 93-96 (2007) - [j8]Gary C. Kessler:
Book Review: Conquest in Cyberspace: National Security and Information Warfare. J. Digit. Forensics Secur. Law 2(2): 67-70 (2007) - 2006
- [j7]Gary C. Kessler:
Cognition, education, and communication technology, P. Gärdenfors, P. Johansson (Eds.). Lawrence Erlbaum Associates, Mahwah (NJ) (2005), 294 pp., US$34.50, ISBN: 0-8058-4280-2 (paper). Internet High. Educ. 9(1): 77-79 (2006) - [j6]Nicole Beebe, Gary C. Kessler:
A Review of: "Real Digital Forensics: Computer Security and Incident Response. By Keith J. Jones, Richard Bejtlich, and Curtis W. Rose". J. Digit. Forensic Pract. 1(4): 325-326 (2006) - [j5]Gary C. Kessler, Michael E. Schirling:
The Design of an Undergraduate Degree Program in Computer & Digital Forensics. J. Digit. Forensics Secur. Law 1(3): 37-50 (2006) - [j4]Gary C. Kessler:
Book Review: Digital Crime and Forensic Science in Cyberspace. J. Digit. Forensics Secur. Law 1(4): 67-70 (2006) - 1999
- [j3]Gary C. Kessler, Ken Rosenblad, Steven D. Shepard:
The Web Can Be Suitable for Learning. Computer 32(2): 114-115 (1999) - 1997
- [j2]Gary C. Kessler, Steven D. Shepard:
The portrayal of the network in the popular media, or what the non-techie person-on-the-street must think of us! IEEE Commun. Mag. 35(5): 114-118 (1997) - [j1]Gary C. Kessler:
The Internet Engineering Task ForceHistory, Background, and Security Guidelines. Inf. Secur. J. A Glob. Perspect. 6(1): 45-54 (1997)
Conference and Workshop Papers
- 2017
- [c5]Gary C. Kessler, Glenn S. Dardick, Douglas Holton:
Using Journals to Assess Non-STEM Student Learning in STEM Courses: A Case Study in Cybersecurity Education. HICSS 2017: 1-9 - 2014
- [c4]Daniel Port, Gary C. Kessler:
Introduction to IS Education and Training Minitrack. HICSS 2014: 4921 - [c3]Gary C. Kessler, James D. Ramsay:
A Proposed Curriculum in Cybersecurity Education Targeting Homeland Security Students. HICSS 2014: 4932-4937 - 2008
- [c2]Gary C. Kessler, Don A. Haggerty:
Pedagogy and Overview of a Graduate Program in Digital Investigation Management. HICSS 2008: 481 - 2007
- [c1]Gary C. Kessler:
Online Education in Computer and Digital Forensics: A Case Study. HICSS 2007: 264
Parts in Books or Collections
- 2017
- [p1]Nurul Hidayah Ab Rahman, Gary C. Kessler, Kim-Kwang Raymond Choo:
Implications of Emerging Technologies to Incident Handling and Digital Forensic Strategies: A Routine Activity Theory. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017: 131-146
Informal and Other Publications
- 1997
- [i2]Gary C. Kessler, Steven D. Shepard:
A Primer On Internet and TCP/IP Tools and Utilities. RFC 2151: 1-52 (1997) - 1994
- [i1]Gary C. Kessler, Steven D. Shepard:
A Primer On Internet and TCP/IP Tools. RFC 1739: 1-46 (1994)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint