Computer forensics field triage process model MK Rogers, J Goldman, R Mislan, T Wedge, S Debrota Journal of Digital Forensics, Security and Law 1 (2), 2, 2006 | 336 | 2006 |
The future of computer forensics: a needs analysis survey MK Rogers, K Seigfried Computers & Security 23 (1), 12-16, 2004 | 241 | 2004 |
A social learning theory and moral disengagement analysis of criminal computer behavior: An exploratory study MK Rogers | 196 | 2001 |
A two-dimensional circumplex approach to the development of a hacker taxonomy MK Rogers Digital investigation 3 (2), 97-102, 2006 | 145 | 2006 |
A cyber forensics ontology: Creating a new approach to studying cyber forensics A Brinson, A Robinson, M Rogers digital investigation 3, 37-43, 2006 | 123 | 2006 |
Self-reported computer criminal behavior: A psychological analysis MK Rogers, K Seigfried, K Tidke digital investigation 3, 116-120, 2006 | 104 | 2006 |
Does deviant pornography use follow a Guttman-like progression? KC Seigfried-Spellar, MK Rogers Computers in Human Behavior 29 (5), 1997-2003, 2013 | 100 | 2013 |
Self-Reported Online Child Pornography Behavior: A Psychological Analysis. KC Seigfried, RW Lovely, MK Rogers International Journal of Cyber Criminology 2 (1), 2008 | 82 | 2008 |
Drone forensic framework: Sensor and data identification and verification U Jain, M Rogers, ET Matson 2017 IEEE Sensors Applications Symposium (SAS), 1-6, 2017 | 81 | 2017 |
The psyche of cybercriminals: A psycho-social perspective MK Rogers Cybercrimes: A multidisciplinary analysis, 217-235, 2010 | 74 | 2010 |
A control model of the movement of attention JG Taylor, M Rogers Neural Networks 15 (3), 309-326, 2002 | 68 | 2002 |
A scoping review of child grooming strategies: Pre-and post-internet TR Ringenberg, KC Seigfried-Spellar, JM Rayz, MK Rogers Child Abuse & Neglect 123, 105392, 2022 | 60 | 2022 |
Hidden disk areas: HPA and DCO MR Gupta, MD Hoeschele, MK Rogers International Journal of Digital Evidence 5 (1), 1-8, 2006 | 56 | 2006 |
Applying traditional military principles to cyber warfare S Liles, JE Dietz, M Rogers, D Larson 2012 4th International Conference on Cyber Conflict (CYCON 2012), 1-12, 2012 | 53 | 2012 |
Mobile phone forensics tool testing: A database driven approach IM Baggili, R Mislan, M Rogers International Journal of Digital Evidence 6 (2), 168-178, 2007 | 46 | 2007 |
Forensic analysis of volatile instant messaging M Kiley, S Dankner, M Rogers Advances in Digital Forensics IV 4, 129-138, 2008 | 45 | 2008 |
Detecting social engineering M Hoeschele, M Rogers Advances in Digital Forensics: IFIP International Conference on Digital
, 2005 | 38 | 2005 |
The development of a meaningful hacker taxonomy: A two dimensional approach M Rogers Retrieved January 23 (2007), 2005-43, 2005 | 36 | 2005 |
Digital forensics: Meeting the challenges of scientific evidence M Meyers, M Rogers Advances in Digital Forensics: IFIP International Conference on Digital
, 2005 | 34 | 2005 |
Self-reported cyber crime: An analysis on the effects of anonymity and pre-employment integrity I Baggili, M Rogers | 32 | 2009 |