Christopher Hargreaves : Publications
Click here to download all publications in a single bibtex file
@article{BREITINGER2024301685,
title = "DFRWS EU 10-year review and future directions in Digital Forensic Research",
author = "Frank Breitinger and Jan-Niclas Hilgert and Christopher Hargreaves and John Sheppard and Rebekah Overdorf and Mark Scanlon",
year = "2024",
issn = "2666-2817",
journal = "Forensic Science International: Digital Investigation",
keywords = "Digital forensics research, Digital forensic science, DFRWS, Research trends, Future directions",
note = "DFRWS EU 2024 - Selected Papers from the 11th Annual Digital Forensics Research Conference Europe",
pages = "301685",
url = "https://www.sciencedirect.com/science/article/pii/S2666281723002044",
volume = "48",
doi = "https://doi.org/10.1016/j.fsidi.2023.301685",
}
@article{HARGREAVES2024301679,
title = "An abstract model for digital forensic analysis tools - A foundation for systematic error mitigation analysis",
author = "Christopher Hargreaves and Alex Nelson and Eoghan Casey",
year = "2024",
issn = "2666-2817",
journal = "Forensic Science International: Digital Investigation",
keywords = "Digital forensics tools, Digital forensics process, Abstraction layers, Validation, Error, Tool testing, CASE",
note = "DFRWS EU 2024 - Selected Papers from the 11th Annual Digital Forensics Research Conference Europe",
pages = "301679",
url = "https://www.sciencedirect.com/science/article/pii/S2666281723001981",
volume = "48",
doi = "https://doi.org/10.1016/j.fsidi.2023.301679",
}
@article{scanlon2023chatgpt,
title = "ChatGPT for digital forensic investigation: The good, the bad, and the unknown",
author = "Scanlon, Mark and Breitinger, Frank and Hargreaves, Christopher and Hilgert, Jan-Niclas and Sheppard, John",
year = "2023",
journal = "Forensic Science International: Digital Investigation",
pages = "301609",
publisher = "Elsevier",
volume = "46",
}
@article{GRUBER2023301501,
title = "Contamination of digital evidence: Understanding an underexposed risk",
author = "Jan Gruber and Christopher J. Hargreaves and Felix C. Freiling",
year = "2023",
issn = "2666-2817",
journal = "Forensic Science International: Digital Investigation",
keywords = "Contamination, Digital evidence, Digital investigations",
note = "Selected papers of the Tenth Annual DFRWS EU Conference",
pages = "301501",
url = "https://www.sciencedirect.com/science/article/pii/S2666281723000021",
volume = "44",
doi = "https://doi.org/10.1016/j.fsidi.2023.301501",
}
@article{du2021tracegen,
title = "TraceGen: User activity emulation for digital forensic test image generation",
author = "Du, Xiaoyu and Hargreaves, Christopher and Sheppard, John and Scanlon, Mark",
year = "2021",
journal = "Forensic Science International: Digital Investigation",
pages = "301133",
publisher = "Elsevier",
volume = "38",
}
@inproceedings{du2020sok,
title = "SoK: Exploring the state of the art and the future potential of artificial intelligence in digital forensic investigation",
author = "Du, Xiaoyu and Hargreaves, Chris and Sheppard, John and Anda, Felix and Sayakkara, Asanka and Le-Khac, Nhien-An and Scanlon, Mark",
year = "2020",
booktitle = "Proceedings of the 15th International Conference on Availability, Reliability and Security",
pages = "1--10",
}
@article{hargreaves2019synctriage,
title = "SyncTriage: Using synchronisation artefacts to optimise acquisition order",
author = "Hargreaves, Christopher and Marshall, Angus",
year = "2019",
journal = "Digital Investigation",
pages = "S134--S140",
publisher = "Elsevier",
volume = "28",
}
@incollection{Hargreaves2017,
title = "{Digital Forensics Education}",
author = "Hargreaves, Christopher",
year = "2017",
booktitle = "Forensic Science Education and Training",
editor = "Williams and Cassella and Maskell",
publisher = "Wiley",
}
@inproceedings{Hargreaves2013,
title = "{Visualisation of allocated and unallocated data blocks in digital forensics}",
author = "Hargreaves, Christopher",
year = "2013",
booktitle = "Proceedings of the European Information Security Multi-Conference",
pages = "133--143",
}
@inproceedings{David2013,
title = "{Detecting Tor Vidalia Bundle Installation}",
author = "David, Anne and Hargreaves, Christopher",
year = "2013",
booktitle = "International Conference on Cybercrime, Security and Digital Forensics",
}
@article{Chivers2012,
title = "{Forensic data recovery from the Windows Search Database}",
author = "Chivers, Howard and Hargreaves, Christopher",
year = "2012",
journal = "Digital Investigation",
number = "SUPPL",
pages = "S69--S79",
volume = "9",
}
@article{Hargreaves2012,
title = "{An automated timeline reconstruction approach for digital forensic investigations}",
author = "Hargreaves, Christopher and Patterson, Jonathan",
year = "2012",
journal = "Digital Investigation",
number = "SUPPL",
pages = "69--79",
volume = "9",
}
@inproceedings{David2012,
title = "{An analysis of Hotmail artefacts in Firefox}",
author = "David, Anne and Hargreaves, Christopher",
year = "2012",
booktitle = "6th Cybercrime Forensics Education and Training",
}
@inproceedings{Patterson2012,
title = "{The Potential for cross-drive analysis using automated digital forensic timelines}",
author = "Patterson, Jonathan and Hargreaves, Christopher",
year = "2012",
booktitle = "6th Cybercrime Forensics Education and Training",
}
@inproceedings{Patterson2011,
title = "{ Automated identification and reconstruction of YouTube video access}",
author = "Patterson, Jonathan and Hargreaves, Christopher",
year = "2011",
booktitle = "5th Cybercrime Forensics Education and Training",
}
@article{Rabaiotti2010,
title = "{Using a software exploit to image RAM on an embedded system}",
author = "Rabaiotti, Joseph and Hargreaves, Christopher",
year = "2010",
journal = "Digital Investigation",
number = "3-4",
pages = "95--103",
volume = "6",
}
@inproceedings{Hargreaves2010a,
title = "{A Virtualisation based forensic computing research tool}",
author = "Hargreaves, Christopher and Chivers, Howard",
year = "2010",
booktitle = "4th Cybercrime Forensics Education and Training",
}
@inproceedings{Hargreaves2010,
title = "{Detecting hidden encrypted volumes}",
author = "Hargreaves, Christopher and Chivers, Howard",
year = "2010",
booktitle = "Communications and Multimedia Security : 11th IFIP TC 6/TC 11 International Conference, CMS 2010",
}
@inproceedings{Hargreaves2009,
title = "{Establishing context when investigating a suspect's internet usage}",
author = "Hargreaves, Christopher",
year = "2009",
booktitle = "3rd Cybercrime Forensics Education {\&} Training",
}
@article{Hargreaves2008b,
title = "{Windows Vista and digital investigations}",
author = "Hargreaves, Christopher and Chivers, Howard and David, Titheridge",
year = "2008",
journal = "Digital Investigation",
number = "1-2",
pages = "34--48",
volume = "5",
}
@inproceedings{Hargreaves2008a,
title = "{Recovery of Encryption Keys from Memory Using a Linear Scan}",
author = "Hargreaves, Christopher and Chivers, Howard",
year = "2008",
booktitle = "International Workshop on Digital Forensics (WSDF'08) as part of The Third International Conference on Availability, Reliability and Security (ARES 2008)",
}
@inproceedings{Hargreaves2008,
title = "{Avoiding live imaging of large encrypted volumes by recovering keys from memory.}",
author = "Hargreaves, Christopher and Chivers, Howard",
year = "2008",
address = "Liverpool",
booktitle = "Advanced in Digital Forensics and Security",
}
@inproceedings{Hargreaves2007,
title = "{Potential Impacts of Windows Vista on Digital Investigations}",
author = "Hargreaves, Christopher and Chivers, Howard",
year = "2007",
booktitle = "Advanced in Computer Security and Forensics",
}
@inproceedings{Hargreaves2006,
title = "{A PDA-Based Live Forensic Tool}",
author = "Hargreaves, Christopher and Chivers, Howard and Sutherland, Iain",
year = "2006",
booktitle = "Proceedings from 1st Advances in Computer Security and Forensics",
}