Kevin D. Fairbanks
Kevin D. Fairbanks
Principal Cyber Operations Engineer, MITRE
Verified email at
Cited by
Cited by
An Analysis of Ext4 for Digital Forensics
KD Fairbanks
DFRWS 2012 Conference 9 (Supplement), Pages S118-S130, 2012
Distinct sector hashes for target file detection.
J Young, K Foster, S Garfinkel, K Fairbanks
Forensic implications of ext4
KD Fairbanks, CP Lee, HL Owen III
Proceedings of the sixth annual workshop on cyber security and information …, 2010
The design of NetSecLab: a small competition-based network security lab
CP Lee, AS Uluagac, KD Fairbanks, JA Copeland
IEEE Transactions on Education 54 (1), 149-155, 2010
Timekeeper: a metadata archiving method for honeypot forensics
KD Fairbanks, CP Lee, YH Xia, HL Owen
2007 IEEE SMC Information Assurance and Security Workshop, 114-118, 2007
Using Network Traffic To Verify Mobile Device Forensic Artifacts
N Malik, J Chandramouli, P Suresh, KD Fairbanks, L Watkins, ...
IEEE CCNC 2017, 2017
Using Network Traffic to Remotely Identify the Type of Applications Executing on Mobile Devices
L Watkins, C Corbett, B Salazar, K Fairbanks, W Robinson
Mobile Security Technologies (MoST 2013), 2013
Remotely Inferring Device Manipulation of Industrial Control Systems Via Network Behavior
G Lontorfos, D Fairbanks, Kevin, L Watkins, H Robinson, William
IEEE Local Computer Networks Workshops (LCN 2015); IEEE Workshop on Network …, 2015
The resource usage viewpoint of industrial control system security: an inference-based intrusion detection system
R Nair, C Nayak, L Watkins, KD Fairbanks, K Memon, P Wang, ...
Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing, 195-223, 2017
Inferring Read and Write Operations of Solid-State Drives Based on Energy Consumption
JP Canclini, J McMaster, J Shey, O Walker, R Rakvic, H Ngo, ...
IEEE UEMCON 2016, 2016
Visual analysis of program flow data with data propagation
Y Xia, K Fairbanks, H Owen
Visualization for Computer Security: 5th International Workshop, VizSec 2008 …, 2008
The Science of Digital Forensics: Factors Affecting Data Decay
K Fairbanks, S Garfinkel
Journal of Digital Forensics, Security and Law 7 (2), 7-10, 2012
A Technique for Measuring Data Persistence Using the Ext4 File System Journal
KD Fairbanks
The 39th Annual International Computers, Software & Applications Conference …, 2015
Monitoring device current to characterize trim operations of solid-state drives
J Shey, JA Blanco, O Walker, TW Tedesso, HT Ngo, R Rakvic, ...
IEEE Transactions on Information Forensics and Security 14 (5), 1296-1306, 2018
BlackBerry IPD parsing for open source forensics
K Fairbanks, K Atreya, H Owen
IEEE Southeastcon 2009, 195-199, 2009
A program behavior matching architecture for probabilistic file system forensics
Y Xia, K Fairbanks, H Owen
ACM SIGOPS Operating systems review 42 (3), 4-13, 2008
Inferring file system of solid state drives based on current consumption
J Melton, R Rakvic, J Shey, H Ngo, O Walker, J Blanco, D Brown, ...
2017 IEEE 7th Annual International Conference on CYBER Technology in …, 2017
Inferring Trimming Activity of Solid-State Drives Based on Energy Consumption
J Shey, R Rakvic, H Ngo, O Walkers, T Teddeso, JA Blanco, KD Fairbanks
2016 IEEE International Instrumentation and Measurement Technology Conference, 2016
A method for historical Ext3 inode to filename translation on honeypots
KD Fairbanks, YH Xia, HL Owen III
2009 33rd Annual IEEE International Computer Software and Applications …, 2009
Establishing trust in black-box programs
Y Xia, K Fairbanks, H Owen
Proceedings 2007 IEEE SoutheastCon, 462-465, 2007
The system can't perform the operation now. Try again later.
Articles 1–20