default search action
Joshua James
Person information
- affiliation: University College Dublin, Ireland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Sungmi Park, Joshua I. James:
Lessons learned building a legal inference dataset. Artif. Intell. Law 32(4): 1011-1044 (2024) - 2022
- [j19]Veronica Schmitt, Pavel Gladyshev, Joshua James:
Medical Device Forensics. IEEE Secur. Priv. 20(1): 96-100 (2022) - [e2]Pavel Gladyshev, Sanjay Goel, Joshua James, George Markowsky, Daryl Johnson:
Digital Forensics and Cyber Crime - 12th EAI International Conference, ICDF2C 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 441, Springer 2022, ISBN 978-3-031-06364-0 [contents] - 2021
- [j18]Gray C. Thomas, Orion Campbell, Nick Nichols, Nicolas Brissonneau, Binghan He, Joshua James, Nicholas Paine, Luis Sentis:
Formulating and Deploying Strength Amplification Controllers for Lower-Body Walking Exoskeletons. Frontiers Robotics AI 8 (2021) - 2020
- [i14]Jiyoon Ham, Joshua I. James:
A Feature Comparison of Modern Digital Forensic Imaging Software. CoRR abs/2001.00301 (2020) - [i13]Min Jin Park, Joshua I. James:
Preliminary Study of a Google Home Mini. CoRR abs/2001.04574 (2020)
2010 – 2019
- 2019
- [j17]Nikolay Akatyev, Joshua I. James:
Evidence identification in IoT networks based on threat assessment. Future Gener. Comput. Syst. 93: 814-821 (2019) - 2018
- [j16]Michael Martin Losavio, Kam-Pui Chow, Andras Koltay, Joshua James:
The Internet of Things and the Smart City: Legal challenges with digital forensics, privacy, and security. Secur. Priv. 1(3) (2018) - [i12]Joshua I. James, Yunsik Jake Jang:
Update Thresholds of More Accurate Time Stamp for Event Reconstruction. CoRR abs/1803.08205 (2018) - 2017
- [j15]Pavel Gladyshev, Joshua I. James:
Decision-theoretic file carving. Digit. Investig. 22: 46-61 (2017) - [j14]Joshua I. James:
How Businesses Can Speed Up International Cybercrime Investigation. IEEE Secur. Priv. 15(2): 102-106 (2017) - [j13]Kyoung Park, Jung-Min Park, Eun-Jin Kim, Chang Cheon, Joshua James:
Anti-Forensic Trace Detection in Digital Forensic Triage Investigations. J. Digit. Forensics Secur. Law 12(1): 31-40 (2017) - [j12]Sungmi Park, Yunsik Jang, Joshua James:
Possession of Child Exploitation Material in Computer Temporary Internet Cache. J. Digit. Forensics Secur. Law 12(3): 7-22 (2017) - [j11]Nikolay Akatyev, Joshua James:
Legislative Requirements for Cyber Peacekeeping. J. Digit. Forensics Secur. Law 12(3): 23-38 (2017) - [i11]Kyong Jae Park, Sungmi Park, Joshua I. James:
A Case Study of the 2016 Korean Cyber Command Compromise. CoRR abs/1711.04500 (2017) - [i10]Nikolay Akatyev, Joshua I. James:
United Nations Digital Blue Helmets as a Starting Point for Cyber Peacekeeping. CoRR abs/1711.04502 (2017) - 2016
- [j10]Joshua I. James, Pavel Gladyshev:
A survey of mutual legal assistance involving digital evidence. Digit. Investig. 18: 23-32 (2016) - [j9]Kibin Lee, Joshua I. James, Tekachew Gobena Ejeta, Hyoung Joong Kim:
Electronic Voting Service Using Block-Chain. J. Digit. Forensics Secur. Law 11(2): 123-136 (2016) - 2015
- [j8]Philipp Amann, Joshua I. James:
Designing robustness and resilience in digital investigation laboratories. Digit. Investig. 12 Supplement 1: S111-S120 (2015) - [j7]Joshua I. James, Pavel Gladyshev:
Automated inference of past action instances in digital investigations. Int. J. Inf. Sec. 14(3): 249-261 (2015) - [c14]Joshua James, Yifan Weng, Stephen Hart, Patrick Beeson, Robert R. Burridge:
Prophetic goal-space planning for human-in-the-loop mobile manipulation. Humanoids 2015: 1185-1192 - [c13]Alleyn Conway, Joshua I. James, Pavel Gladyshev:
Development and Initial User Evaluation of a Virtual Crime Scene Simulator Including Digital Evidence. ICDF2C 2015: 16-26 - [c12]Joshua I. James, Pavel Gladyshev:
A Survey of International Cooperation in Digital Investigations. ICDF2C 2015: 103-114 - [c11]Nikolay Akatyev, Joshua I. James:
Cyber Peacekeeping. ICDF2C 2015: 126-139 - [e1]Joshua I. James, Frank Breitinger:
Digital Forensics and Cyber Crime - 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 157, Springer 2015, ISBN 978-3-319-25511-8 [contents] - [i9]Joshua I. James, Yunsik Jake Jang:
Practical and Legal Challenges of Cloud Investigations. CoRR abs/1502.01133 (2015) - [i8]Joshua I. James, Alejandra Lopez-Fernandez, Pavel Gladyshev:
Measuring Accuracy of Automated Parsing and Categorization Tools and Processes in Digital Investigations. CoRR abs/1502.05186 (2015) - [i7]Joshua I. James, Ahmed F. Shosha, Pavel Gladyshev:
Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE. CoRR abs/1502.05191 (2015) - 2014
- [j6]Joshua I. James:
Multi-Stakeholder Case Prioritization in Digital Investigations. J. Digit. Forensics Secur. Law 9(2): 59-72 (2014) - [i6]Joshua I. James, Pavel Gladyshev:
Automated Inference of Past Action Instances in Digital Investigations. CoRR abs/1407.5714 (2014) - 2013
- [j5]Martin B. Koopmans, Joshua I. James:
Automated network triage. Digit. Investig. 10(2): 129-137 (2013) - [j4]Joshua I. James, Pavel Gladyshev:
A survey of digital forensic investigator decision processes and measurement of decisions based on enhanced preview. Digit. Investig. 10(2): 148-157 (2013) - [j3]Namheun Son, Yunho Lee, Dohyun Kim, Joshua I. James, Sangjin Lee, Kyungho Lee:
A study of user data integrity during acquisition of Android devices. Digit. Investig. 10(Supplement): S3-S11 (2013) - [c10]Joshua I. James, Alejandra Lopez-Fernandez, Pavel Gladyshev:
Measuring Accuracy of Automated Parsing and Categorization Tools and Processes in Digital Investigations. ICDF2C 2013: 147-169 - [c9]Joshua I. James, Ahmed F. Shosha, Pavel Gladyshev:
Determining Training Needs for Cloud Infrastructure Investigations Using I-STRIDE. ICDF2C 2013: 223-236 - [i5]Joshua James, Pavel Gladyshev, Mohd Taufik Abdullah, Yuandong Zhu:
Analysis of Evidence Using Formal Event Reconstruction. CoRR abs/1302.2308 (2013) - [i4]Joshua James, Pavel Gladyshev, Yuandong Zhu:
Signature Based Detection of User Events for Post-Mortem Forensic Analysis. CoRR abs/1302.2395 (2013) - [i3]Joshua James, Pavel Gladyshev:
Challenges with Automation in Digital Forensic Investigations. CoRR abs/1303.4498 (2013) - [i2]Joshua I. James, Yunsik Jake Jang:
An Assessment Model for Cybercrime Investigation Capacity. CoRR abs/1307.0076 (2013) - [i1]Joshua I. James, Yunsik Jake Jang:
Measuring digital crime investigation capacity to guide international crime prevention strategies. CoRR abs/1308.6363 (2013) - 2012
- [c8]Ahmed F. Shosha, Joshua I. James, Alan Hannaway, Chen-Ching Liu, Pavel Gladyshev:
Towards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation Purposes. ICDF2C 2012: 66-80 - [c7]Keyun Ruan, Joshua James, Joe Carthy, M. Tahar Kechadi:
Key Terms for Service Level Agreements to Support Cloud Forensics. IFIP Int. Conf. Digital Forensics 2012: 201-212 - [c6]Ahmed F. Shosha, Joshua James, Chen-Ching Liu, Pavel Gladyshev:
Towards Automated Forensic Event Reconstruction of Malicious Code (Poster Abstract). RAID 2012: 388-389 - 2011
- [c5]Ahmed F. Shosha, Joshua James, Pavel Gladyshev:
A Novel Methodology for Malware Intrusion Attack Path Reconstruction. ICDF2C 2011: 131-140 - 2010
- [c4]Joshua James, Pavel Gladyshev, Yuandong Zhu:
Signature Based Detection of User Events for Post-mortem Forensic Analysis. ICDF2C 2010: 96-109 - [c3]Yuandong Zhu, Joshua James, Pavel Gladyshev:
A Consistency Study of the Windows Registry. IFIP Int. Conf. Digital Forensics 2010: 77-90
2000 – 2009
- 2009
- [j2]Yuandong Zhu, Joshua James, Pavel Gladyshev:
A comparative methodology for the reconstruction of digital events using windows restore points. Digit. Investig. 6(1-2): 8-15 (2009) - [j1]Yuandong Zhu, Pavel Gladyshev, Joshua James:
Using shellbag information to reconstruct user activities. Digit. Investig. 6(Supplement): S69-S77 (2009) - [c2]Joshua James, Pavel Gladyshev, Mohd Taufik Abdullah, Yuandong Zhu:
Analysis of Evidence Using Formal Event Reconstruction. ICDF2C 2009: 85-98 - [c1]Yuandong Zhu, Pavel Gladyshev, Joshua James:
Temporal Analysis of Windows MRU Registry Keys. IFIP Int. Conf. Digital Forensics 2009: 83-93
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint