- Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Carole E. Chaski, Blake Stephen Howald. Identifying Authorship by Byte-Level N-Grams: The Source Code Author Profile (SCAP) Method. IJDE, 6(1), 2007.
- Matthew Kiley, Tim Shinbara, Marcus Rogers. iPOD Forensics Update. IJDE, 6(1), 2007.
- Pavel Gladyshev, Andreas Enbacka. Rigorous Development of Automated Inconsistency Checks for Digital Evidence Using the B Method. IJDE, 6(2), 2007.
- Derek Bem, Ewa Huebner. Computer Forensic Analysis in a Virtual Environment. IJDE, 6(2), 2007.
- Omer Demir, Ping Ji, Jinwoo Kim. Session Based Packet Marking and Auditing for Network Forensics. IJDE, 6(1), 2007.
- Ibrahim M. Baggili, Richard Mislan, Marcus Rogers. Mobile Phone Forensics Tool Testing: A Database Driven Approach. IJDE, 6(2), 2007.
- Jesse D. Kornblum. Exploiting the Rootkit Paradox with Windows Memory Analysis. IJDE, 5(1), 2006.
- Mayank R. Gupta, Michael D. Hoeschele, Marcus K. Rogers. Hidden Disk Areas: HPA and DCO. IJDE, 5(1), 2006.
- Benjamin Turnbull, Barry Blundell, Jill Slay. Google Desktop as a Source of Digital Evidence. IJDE, 5(1), 2006.
- Fabio Casadei, Antonio Savoldi, Paolo Gubian. Forensics and SIM Cards: An Overview. IJDE, 5(1), 2006.