Eoghan Casey
Digital forensics professional, researcher, and author
Eoghan Casey's AcademicInfluence.com Rankings

Download Badge
Computer Science
Eoghan Casey's Degrees
- PhD Digital Forensics George Mason University
- Masters Computer Science University of Maryland, College Park
Similar Degrees You Can Earn
Why Is Eoghan Casey Influential?
(Suggest an Edit or Addition)According to Wikipedia, Eoghan Casey is a digital forensics professional, researcher, and author. Casey has conducted a wide range of digital investigations, including data breaches, fraud, violent crimes, identity theft, and on-line criminal activity. He is also a member of the Digital/Multimedia Scientific Area Committee of the Organization for Scientific Area Committees. He helps organize the digital forensic research DFRWS.org conferences each year, and is on the DFRWS Board of Directors. He has a B.S. in Mechanical Engineering from the University of California, Berkeley, an M.A. in Educational Communication and Technology from New York University, and a Ph.D. in Computer Science from University College Dublin.
Eoghan Casey's Published Works
Published Works
- Digital Evidence and Computer Crime (2000) (397)
- Digital Evidence and Computer Crime - Forensic Science, Computers and the Internet, 3rd Edition (2011) (270)
- Growing pains (2005) (216)
- Handbook of Digital Forensics and Investigation (2009) (211)
- Error, Uncertainty and Loss in Digital Evidence (2002) (144)
- Network traffic as a source of evidence: tool strengths, weaknesses, and future needs (2004) (94)
- Handbook of Computer Crime Investigation: Forensic Tools and Technology (2001) (82)
- Malware Forensics: Investigating and Analyzing Malicious Code (2008) (81)
- The impact of full disk encryption on digital forensics (2008) (75)
- Forensic psychiatry and the internet: practical perspectives on sexual predators and obsessional harassers in cyberspace. (2002) (73)
- Investigation Delayed Is Justice Denied: Proposals for Expediting Forensic Examinations of Digital Evidence * (2009) (72)
- IoT forensic challenges and opportunities for digital traces (2019) (72)
- Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet with Cdrom (2000) (68)
- The growing need for on-scene triage of mobile devices (2010) (63)
- Leveraging CybOX™ to standardize representation and exchange of digital forensic information (2015) (60)
- Investigating sophisticated security breaches (2006) (57)
- Investigating child exploitation and pornography : the Internet, the law and forensic science (2005) (53)
- What does "forensically sound" really mean? (2007) (44)
- The Kodak Syndrome: Risks and Opportunities Created by Decentralization of Forensic Capabilities (2018) (41)
- The chequered past and risky future of digital forensics (2019) (40)
- Advancing coordinated cyber-investigations and tool interoperability using a community developed specification language (2017) (38)
- The growing impact of full disk encryption on digital forensics (2011) (38)
- Digital Evidence on Mobile Devices (2011) (36)
- A Framework for Harmonizing Forensic Science Practices and Digital/Multimedia Evidence (2018) (36)
- Case study: Network intrusion investigation - lessons in forensic preparation (2005) (35)
- Practical Approaches to Recovering Encrypted Digital Evidence (2002) (34)
- Introduction to Windows Mobile Forensics (2010) (34)
- Honing digital forensic processes (2013) (34)
- Extracting Windows command line details from physical memory (2010) (32)
- Tool review - remote forensic preservation and examination tools (2004) (25)
- Clearly conveying digital forensic results (2018) (19)
- Chapter 2 – Forensic Analysis (2010) (18)
- Determining Intent — Opportunistic vs Targeted Attacks (2003) (14)
- Standardization of forming and expressing preliminary evaluative opinions on digital evidence (2020) (14)
- Triage in digital forensics (2013) (12)
- Digital transformation risk management in forensic science laboratories. (2020) (12)
- Design tradeoffs for developing fragmented video carving tools (2014) (11)
- Standardization of file recovery classification and authentication (2019) (11)
- Digital evidence maps - A sign of the times (2007) (11)
- Tool review - WinHex (2004) (11)
- Chronological independently verifiable electronic chain of custody ledger using blockchain technology (2020) (10)
- The role of evaluations in reaching decisions using automated systems supporting forensic analysis (2020) (10)
- Conducting digital investigations (2011) (10)
- Chapter 4 – Intrusion Investigation (2010) (10)
- Using computed similarity of distinctive digital traces to evaluate non-obvious links and repetitions in cyber-investigations (2018) (10)
- Applications of Research (2006) (9)
- Transdisciplinary strategies for digital investigation challenges (2018) (9)
- Moving forward in a changing landscape (2006) (9)
- The Evolution of Expressing and Exchanging Cyber-investigation Information in a Standardized Form (2018) (9)
- Digital Stratigraphy: Contextual Analysis of File System Traces in Forensic Science (2018) (9)
- Differentiating the phases of digital investigations (2016) (9)
- Digital dust: Evidence in every nook and cranny (2010) (8)
- Tamperproof timestamped provenance ledger using blockchain technology (2020) (8)
- Do Identities Matter (2019) (8)
- Interrelations between digital investigation and forensic science (2019) (8)
- Digital forensics: Coming of age (2009) (7)
- Forensic acquisition and analysis of palm webOS on mobile devices (2011) (7)
- Editorial - A sea change in digital forensics and incident response (2016) (7)
- Cutting corners: Trading justice for cost savings (2006) (6)
- Digital transformations and the viability of forensic science laboratories: Crisis-opportunity through decentralisation. (2018) (6)
- Forensic Analysis as Iterative Learning (2020) (6)
- The broadening horizons of digital investigation (2017) (6)
- Cyberpatterns: Criminal Behavior on the Internet (2012) (5)
- Digital Evidence in the Courtroom (2011) (5)
- Editorial - Cutting the Gordian knot: Defining requirements for trustworthy tools (2012) (5)
- Structuring the Evaluation of Location-Related Mobile Device Evidence (2020) (5)
- Reporting security breaches - a risk to be avoided or responsibility to be embraced? (2004) (5)
- Cloud computing and digital forensics (2012) (5)
- The increasing need for automation and validation in digital forensics (2011) (5)
- Trust in digital evidence (2019) (5)
- Smart home forensics (2015) (5)
- 1 Using Standardization and Ontology to Enhance Data Protection and Intelligent Analysis of Electronic Evidence (2017) (4)
- COMPUTER CRIME AND DIGITAL EVIDENCE (2005) (4)
- Growing societal impact of digital forensics and incident response (2014) (4)
- Smartphone incident response (2013) (4)
- "Dawn raids" bring a new form in incident response (2009) (4)
- What constitutes a proper education? (2014) (4)
- Digital arms race - The need for speed (2005) (4)
- The value of forensic preparedness and digital-identification expertise in smart society (2017) (4)
- Experimental design challenges in digital forensics (2013) (4)
- Structured decision making in investigations involving digital and multimedia evidence (2020) (4)
- Maturation of digital forensics (2019) (4)
- The need for knowledge sharing and standardization (2004) (4)
- The growing importance of data science in digital investigations (2015) (3)
- Reconstructing digital evidence (2011) (3)
- Origins and progress (2005) (3)
- Editorial - A smörgåsbord of digital evidence (2017) (3)
- Strengthening trust: Integration of digital investigation and forensic science (2020) (3)
- A formalized model of the Trace. (2021) (3)
- UNIX Forensic Analysis (2010) (3)
- The value of behavioral analysis in digital investigations (2006) (3)
- State of the field: growth, growth, growth (2004) (3)
- Strengthening forensic science (2015) (2)
- Attacks against forensic analysis (2007) (2)
- The knowledge management gap in digital investigations (2018) (2)
- Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Field Guide for Linux Systems (2013) (2)
- Inter‐regional digital forensic knowledge management: needs, challenges, and solutions (2020) (2)
- Introduction to Malware Forensics (2012) (1)
- Focused digital evidence analysis and forensic distinguishers (2016) (1)
- Chapter 2 – Memory Forensics: Analyzing Physical and Process Memory Dumps for Malware Artifacts (2012) (1)
- Digital investigations, security and privacy (2010) (1)
- Analysis of a Malware Specimen (2012) (1)
- Editorial: The epic story of scientific interpretation in digital investigations (2020) (1)
- Editorial: IT security is not enough (2012) (1)
- Motivating STEM+C Learning with Social Impact of Cybersecurity and Digital Forensics (2020) (1)
- Chapter 1 – Malware Incident Response: Volatile Data Collection and Examination on a Live Windows System (2012) (1)
- Confronting Encryption in Computer Investigations (2016) (0)
- Chapter 9 – Network Investigations (2010) (0)
- Enhancing forensic science through basic and applied research (2013) (0)
- Chapter 3 – Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Windows Systems (2012) (0)
- Corrigendum to 'Advancing coordinated cyber-investigations and tool interoperability using a community developed specification language' [Digital Investigation 22C (2017) 14-45] (2019) (0)
- Chapter 6 – Analysis of a Malware Specimen (2014) (0)
- This little laptop went to the black market (2006) (0)
- Crowdsourcing forensics: Creating a curated catalog of digital forensic artifacts (2022) (0)
- The need for translational research in digital investigation (2018) (0)
- Chapter 1 – Malware Incident Response: Volatile Data Collection and Examination on a Live Linux System (2014) (0)
- Chapter 1 – Linux Malware Incident Response (2013) (0)
- Chapter 3 – Postmortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Linux Systems (2014) (0)
- IoT Forensic Science (2020) (0)
- Editorial from my iPhone (2016) (0)
- Editorial: Applications of Research (2006) (0)
- Motivating youth to learn STEM through a gender inclusive digital forensic science program (2023) (0)
- Editorial: The need for objective case review (2004) (0)
- Chapter 2 – Linux Memory Forensics: Analyzing Physical and Process Memory Dumps for Malware Artifacts (2014) (0)
- Investigating security breaches (2005) (0)
- Chapter 5 – File Identification and Profiling: Initial Analysis of a Suspect File on a Windows System (2012) (0)
- Responding to a data breach: A little knowledge is a dangerous thing (2011) (0)
- State of the Journal (2008) (0)
- New developments in digital & multimedia forensics (2013) (0)
- Chapter 4 – Legal Considerations (2012) (0)
- Panoramic perspective of Digital Investigation (2019) (0)
- Editorial: Research summary issue 3-4 (2006) (0)
- Editorial - Crisis or opportunity? (2020) (0)
- Editorial - Delivering digital forensic science as a service (2020) (0)
- A unified voice: The need for an international digital forensic convention (2011) (0)
- Chapter 5 – File Identification and Profiling: Initial Analysis of a Suspect File on a Linux System (2014) (0)
- Corrigendum to "Tamperproof timestamped provenance ledger using blockchain technology∗" [Forens. Sci. Int.: Digit. Invest. 33 (2020) 300977] (2022) (0)
- The need for objective case review (2004) (0)
- Chapter 11 – Reconstructing digital evidence (2007) (0)
This paper list is powered by the following services:
Other Resources About Eoghan Casey
What Schools Are Affiliated With Eoghan Casey?
Eoghan Casey is affiliated with the following schools: