1. Developing a File System Structure to Solve Healthy Big Data Storage and Archiving Problems Using a Distributed File System
2. Distinct Sector Hashes for Target File Detection
3. S. Garfinkel , A. Nelson , D. White , and V. Roussev , " Using purpose-built functions and block hashes to enable small block and sub-file forensics," digital investigation , vol. 7 , pp. S13 -- S23 , 2010 . S. Garfinkel, A. Nelson, D. White, and V. Roussev, "Using purpose-built functions and block hashes to enable small block and sub-file forensics," digital investigation, vol. 7, pp. S13--S23, 2010.
4. J. Jones , T. Khan , K. Laskey , A. Nelson , M. Laamanen , and D. White , " Inferring previously uninstalled applications from digital traces," in Proceedings of the Conference on Digital Forensics , Security and Law , 2016 , pp. 113 -- 130 . J. Jones, T. Khan, K. Laskey, A. Nelson, M. Laamanen, and D. White, "Inferring previously uninstalled applications from digital traces," in Proceedings of the Conference on Digital Forensics, Security and Law, 2016, pp. 113--130.
5. O. Adegbehingbe and J. Jones , " Improved Decay Tolerant Inference of Previously Uninstalled Computer Applications," Annual ADFSL Conference on Digital Forensics , Security and Law , May 2019 . Available : https://commons.erau.edu/adfsl/2019/paper-presentation/9 O. Adegbehingbe and J. Jones, "Improved Decay Tolerant Inference of Previously Uninstalled Computer Applications," Annual ADFSL Conference on Digital Forensics, Security and Law, May 2019. Available: https://commons.erau.edu/adfsl/2019/paper-presentation/9