The Publications of Frank
(in chronological order, by category)
Books
- Frank Adelstein, Sandeep Gupta, Golden G. Richard, III, and
Loren Schwiebert, Fundamentals of Mobile and Pervasive Computing,
McGraw-Hill Professional, New York, 2005, 404 pages, ISBN: 0071412379.
Journals
- Frank Adelstein, Golden Richard, Loren Schwiebert, Rick
Parent, and Mukesh Singhal, A Distributed Graphics Library
System, Software-Practice and Experience,
24(4):363-376, April 1994.
See abtract or
full paper.
- Frank Adelstein and Mukesh Singhal, Real-Time Causal Ordering
in Multimedia Systems, Journal of Telecommunication Systems,
Modeling, Analysis, Design, and Management, No. 7, July 1997,
pp. 59-74.
- Frank Adelstein, Golden G. Richard, III, and Loren Schwiebert,
Distributed Multicast Tree Generation with Dynamic Group Membership,
Computer Communications, 26(10):1105-1128, June 20, 2003.
See abstract or
full paper.
- Frank Adelstein, MFP: The Mobile Forensic Platform,
International Journal of Digital Evidence, 2(1), 2003.
See abstract or
full paper.
- Frank Adelstein, Prasanth Alla, Robert Joyce, and Golden G.
Richard, III, Physically Locating Wireless Intruders in
Journal of Universal Computer Science, 11(1), January 2005,
available online.
See abstract or
full paper.
- Frank Adelstein,
Live forensics: diagnosing your system without killing it first,
Communications of the ACM, 49(2):63-66, February, 2006.
See abstract or
full paper.
- The Common Digital Evidence Storage Format Working Group
(Frank Adelstein, Brian Carrier, Eoghan Casey, Simson Garfinkel,
Chet Hosmer, Jessie Kornblum, James Lyle, Marcus Rogers, Phil Turner),
Standardizing digital evidence storage,
Communications of the ACM, 49(2):67-68, February, 2006.
See full paper.
- Rachel Zax and Frank Adelstein,
FAUST: Forensic Artifacts of Uninstalled Steganography Tools,
Journal of Digital Investigation , 6(1-2):25-38, 2009.
See abstract or
full paper.
Conferences
- Frank Adelstein and Mukesh Singhal,
Priority Ethernets: Multimedia Support on Local Area Networks ,
Presented at the ISMM Int'l Conf. on Multimedia Systems and Applications,
1994.
See
abstract or
full papers.
- Frank Adelstein and Mukesh Singhal,
Real-Time Causal Message Ordering,
Presented at the 3rd ORSA Conference on Telecommunication,
Boca Raton, Florida, March 1995.
- Frank Adelstein and Mukesh Singhal,
Real-Time Causal Message Ordering in Multimedia Systems ,
Presented at the 15th International Conference on Distributed
Computing Systems, Vancouver, British Columbia, June 1995.
See
abstract or
full papers.
-
Frank Adelstein, Fred Hosch, Golden Richard, and Loren
Schwiebert, Bessie: Portable Generation of Network
Topologies for Simulation, IEEE International
Conference on Computer Communications and Networs (IC3N),
Layfayette, LA, pages 787-792, October 1998.
See
abstract or
full paper.
- Frank Adelstein, Golden Richard, and Loren Schwiebert,
Building Dynamic Multicast Trees in Mobile Networks,
1999 ICPP Workshop on Group Communication, pages
17-22, September 1999.
See
abstract or
full paper.
- Frank Adelstein, ASTER: Active Smart Targets for Effective Response,
presented at the 3rd International System Security Engineering
Association (ISSEA) Conference, Orlando, FL, March 2002.
See
abstract or
full paper.
- Frank Adelstein, The Mobile Forensic Platform, presented
at the second Digital Forensics Research Workshop (DFRWS02),
Syracuse, NY, August 2002.
See
abstract or
full paper.
- Frank Adelstein, Prasanth Alla, Robert Joyce, and Golden G.
Richard, III, Physically Locating Wireless Intruders in
Proceedings of IEEE 2004 IAS Conference, Las Vegas,
Nevada, April 2004.
See
abstract or
full paper.
- Frank Adelstein, Yun Gao, and Golden G. Richard III,
Automatically creating Realistic Targets for Digital Forensics
Investigations presented at the fifth Digital Forensics
Research Workshop (DFRWS05), New Orleans, LA, August 2005.
See
abstract or
full paper.
- Frank Adelstein and Robert Joyce,
File Marshal: Automatic Extraction of Peer-to-Peer Data
presented at the 7th Digital Forensics
Research Workshop (DFRWS07), Pittsburgh, PA, August 2007.
See
abstract or
full paper.
- Robert Joyce, Judson Powers, and Frank Adelstein,
MEGA: A Tool for Mac OS X Operating System and Application Forensics
presented at the 8th Digital Forensics
Research Workshop (DFRWS08), Baltimore, MD, August 2008.
See
abstract or
full paper.
- Stephen Brueckner, David Guaspari, Frank Adelstein, and
Joseph Weeks, Automated Computer Forensics Training in a
Virtualized Environment presented at the 8th
Digital Forensics Research Workshop (DFRWS08),
Baltimore, PA, August 2008.
See
abstract or
full paper.
- Frank Adelstein, and Calra Marceau, Snapshot Filtering Based
On Resource-Usage Profiles proceedings of the
Fourth International IEEE Workshop on Systematic Approaches
to Digital Forensic Engineering (SADFE 09),
Berkeley, California, pages 15-21, May 2009.
See
abstract or
full paper.
- Hajime Inoue, Frank Adelstein, Matthew Donovan, and Steve Brueckner,
Automatically Bridging the Semantic Gap Using a C Interpreter
proceedings of the 2011 Annual Symposium on Information Assurance
Albany, NY. June 7-8, 2011.
See
abstract or
full paper
- Hajime Inoue, Frank Adelstein, and Robert Joyce,
Visualization in Testing a Volatile Memory Forensic Tool,
presented at the 11th Digital Forensics Research Workshop
(DFRWS11), New Orleans, LA, August 2011.
See abstract or
full paper(TBD).
- Dianne Dietrich and Frank Adelstein,
Archival Science, Digital Forensics, and New Media Art,
presented at the 15th Digital Forensics Research Workshop
(DFRWS15), Philadelphia, PA, August 2015.
See abstract or
full paper.
Invited Lectures, Presentations, and Panels
- Multimedia For The Masses, presented at the University
of New Orleans, New Orleans, LA, August 1995.
- Wireless Security, presented at Wayne State University,
Detroit, MI, March 2002.
- The Mobile Forensic Platform presented at the CRIME (Computer
Related Investigations, Management & Education) Meeting,
Portland, OR, October 2003.
- The Mobile Forensic Platform, presented at the SEC-WOG group at
The Ohio State University, Columbus, OH, January 2004.
- The Mobile Forensics Platform, presented at the Columbus
Chapter of InfraGuard, Columbus, OH, February 2004.
- Live computer forensics – Catching attackers red-handed,
(with Robert Joyce), presented at 2004 NYS Annual Cyber Security Conference,
Albany, New York, April 2004.
- Incident Response (a.k.a. Notes from the napkin of knowledge),
(with Robert Joyce) presented at The University of Albany, Albany, NY,
April 2004.
- ASTER – Active Smart Targets for Effective Response,
presented at Polytechnic University, Brooklyn, NY, October 2004.
- ATC-NY & Poly Collaborative Forensic Research,
presented at the Center for Advanced Technology in Telecomputation (CATT),
Polytechnic University, Brooklyn, NY, September 2005.
- Live Forensics, presented at the 5th Annual Recent
Advances in Information Assurance, Network and Software Security (IANSS)
Symposium, St. Cloud State University, St. Cloud, MN, May 2, 2007.
- Hide and Seek: Advancements in Digital Evidence Recovery,
served on a panel session at the NIJ Conference, Arlington, VA, July 2007.
- Live Forensics, presented at the 14th ACM Conference on
Computer and Communication Security, Alexandria, VA, October 31, 2007.
- Forensic Artifacts from the eMule P2P Client presented at
the U.S. Department of Defense Cyber Crime Conference 2011, Atlanta, GA,
January 27, 2011.
- Digital Forensic presented as a guest lecture for CS5434
Defending Computer Networks class at Cornell University, Ithaca, NY,
November 18, 2014.
- A View from the Trenches: World "Wild" Web Security
presented as a guest lecture for CSE8990 Graduate Seminar,
at Wayne State University, Detroit, MI, February 28, 2017.
- Member of invitation-only blue ribbon panel at NSF sponsored
National Workshop on Redefining Cyber Forensics (NWRCF),
Windsor Locks, CT, May 23-24, 2017.
Tutorials
- Mobile Security, 20th IEEE International Performance,
Computing, and Communications Conference (IPCCC 2001), Phoenix, AZ,
April 4-6, 2001.
See
abstract.
- Mobile and Wireless Security, 17th Annual Computer Security
Applications Conference (ACSAC'01), New Orleans, LA,
December 10-14, 2001.
See
abstract.
- Live Forensics, 23rd Annual Computer Security
Applications Conference (ACSAC'06), Miami, FL,
December 11-14, 2006.
See
abstract.
- Live Forensics, 16th Usenix Security Symposium,
Boston, MA, August 6-11, 2007.
- Live Forensics, 2008 Usenix Annual Technical
Conference, Boston, MA, June 22-27, 2008.
- Learning Reverse Engineering: A Highly Immersive Approach,
2009 Usenix Security Symposium,
Montreal, QB, Canada, August 10-11, 2009.
Patents
- Frank N. Adelstein, Matthew A. Stillerman, and Robert Joyce,
Remote Collection of Computer Forensic Evidence,
US Patent 7,496,959, filed June 23, 2003, issued February 24, 2009.
- Frank N Adelstein, Haim Bar, Prasanth Alla, and Nikita Proskourine,
Attack correlation using marked information,
US Patent 7,748,040, filed March 22, 2005, issued June 29, 2010.
- Frank N. Adelstein, Judson Powers, Robert A. Joyce, and Derek Bronner,
Extensible Software Tool for Investigating Peer-to-Peer Usage
on a Target Device,
US Patent 7,886,049, filed August 12, 2008, issued February 8, 2011.
- Frank N. Adelstein, Matthew A. Stillerman, and Robert Joyce,
Remote Collection of Computer Forensic Evidence,
US Patent 8,176,557, filed February 12, 2009, issued May 8, 2012.
- Frank N Adelstein, Haim Bar, Prasanth Alla, and Nikita Proskourine,
Attack correlation using marked information,
US Patent 8,286,249, filed May 18, 2010, issued October 9, 2012.
- Frank N. Adelstein and Carla Marceau,
Digital forensic analysis using empirical privilege profiling (EPP)
for filtering collected data
US Patent 8,458,805, filed May 20, 2009, issued June 4, 2013.
- Frank N. Adelstein, Matthew A. Stillerman, and Robert Joyce,
Remote Collection of Computer Forensic Evidence,
US Patent 8,474,047, filed May 7, 2012, issued June 25, 2013.
- Judson Powers, Matthew P. Donovan, Frank N. Adelstein, Michael Kently,
and Stephen K. Brueckner,
Mediating communication of a universal serial bus device,
US Patent 8,862,803, filed May 31, 2011, issued October 14, 2014.
- Stephen K. Brueckner, Frank N. Adelstein, Haim Bar, and Matthew Donovan
Automated execution and evaluation of network-based training exercises,
US Patent 9,076,342, filed February 18, 2009, issued July 7, 2015.
- Stephen K. Brueckner, Frank N. Adelstein, Haim Bar, and Matthew Donovan
Automated execution and evaluation of network-based training exercises,
US Patent 9,384,677, filed April 10, 2015, issued July 4, 2016.
- Stephen K. Brueckner, Frank N. Adelstein, Haim Yehuda Bar, and
Matthew P. Donovan
Automated execution and evaluation of network-based training exercises,
US Patent 10,068,493, filed June 30, 2016, issued September 4, 2018.
- Stephen K. Brueckner, Frank N. Adelstein, Haim Yehuda Bar, and
Matthew P. Donovan
Automated execution and evaluation of network-based training exercises,
US Patent 10,777,093, filed August 9, 2018, issued September 15, 2020.
Dissertation
Technical Reports
This page last modified Sep 22, 2020.
Home
feed