Digital forensic investigation of cloud storage services H Chung, J Park, S Lee, C Kang Digital investigation 9 (2), 81-95, 2012 | 235 | 2012 |
Digital forensic approaches for Amazon Alexa ecosystem H Chung, J Park, S Lee Digital Investigation 22, S15-S25, 2017 | 111 | 2017 |
Data concealment and detection in Microsoft Office 2007 files B Park, J Park, S Lee Digital Investigation 5 (3-4), 104-114, 2009 | 53 | 2009 |
Forensic analysis techniques for fragmented flash memory pages in smartphones J Park, H Chung, S Lee Digital Investigation 9 (2), 109-118, 2012 | 38 | 2012 |
A study on multimedia file carving method B Yoo, J Park, S Lim, J Bang, S Lee Multimedia Tools and Applications 61 (1), 243-261, 2012 | 34 | 2012 |
Forensic analysis of android phone using ext4 file system journal log D Kim, J Park, K Lee, S Lee Future information technology, application, and service, 435-446, 2012 | 33 | 2012 |
A research on the investigation method of digital forensics for a VMware Workstation’s virtual machine S Lim, B Yoo, J Park, KD Byun, S Lee Mathematical and computer modelling 55 (1-2), 151-160, 2012 | 21 | 2012 |
Forensic investigation of Microsoft PowerPoint files J Park, S Lee Digital Investigation 6 (1), 16-24, 2009 | 21 | 2009 |
Recovery of Damaged Compressed Files for Digital Forensic Purposes B Park, A Savoldi, P Gubian, J Park, S Lee Multimedia and Ubiquitous Engineering, 2008. MUE 2008. International …, 2008 | 13 | 2008 |
Analysis framework to detect artifacts of portable web browser JH Choi, K Lee, J Park, C Lee, S Lee Information technology convergence, secure and trust computing, and data …, 2012 | 12 | 2012 |
Investigation methodology of a virtual desktop infrastructure for IoT D Jeong, J Park, S Lee, C Kang Journal of Applied Mathematics 2015, 2015 | 10 | 2015 |
Extraction of residual information in the microsoft powerpoint file from the viewpoint of digital forensics considering percom environment JH Park, B Park, SJ Lee, SH Hong, JH Park 2008 Sixth Annual IEEE International Conference on Pervasive Computing and …, 2008 | 10 | 2008 |
Data fragment forensics for embedded DVR systems J Park, S Lee Digital Investigation 11 (3), 187-200, 2014 | 8 | 2014 |
A study on a carving method for deleted ntfs compressed files B Yoo, J Park, J Bang, S Lee 2010 3rd International Conference on Human-Centric Computing, 1-6, 2010 | 8 | 2010 |
Data extraction from damage compressed file for computer forensic purposes B Park, A Savoldi, P Gubian, J Park, SH Lee, S Lee International Journal of Hybrid Information Technology 1 (4), 89-102, 2008 | 8 | 2008 |
Forensic artifacts left by virtual disk encryption tools S Lim, J Park, K Lim, C Lee, S Lee 2010 3rd International Conference on Human-Centric Computing, 1-6, 2010 | 7 | 2010 |
TREDE and VMPOP: Cultivating multi-purpose datasets for digital forensics – A Windows registry corpus as an example J Park Digital Investigation, 2018 | 3 | 2018 |
Forensic analysis of residual information in adobe pdf files H Chung, J Park, S Lee Future Information Technology, 100-109, 2011 | 3 | 2011 |
Reassembling Linux‐based Hybrid RAID JH Choi, J Park, S Lee Journal of forensic sciences 65 (3), 966-973, 2020 | 2 | 2020 |
Digital forensic apparatus for analyzing user activities and method thereof WY Choi, SK Un, H Do Won, SJ Lee, JW Bang, JH Park, NH Son US Patent App. 13/324,683, 2012 | 2 | 2012 |