Difference between revisions of "Main Page"
From Simson Garfinkel
Jump to navigationJump to search
m |
|||
Line 39: | Line 39: | ||
;Writing: | ;Writing: | ||
* | * [http://www.technologyreview.com/ MIT Technology Review], ''guest contributor'' | ||
* | * [http://www.journals.elsevier.com/computers-and-security/ Computers & Security], Associate Editor | ||
* | * [[DUE-1140938|'Technical Privacy Auditing'' with computer forensics tools]] | ||
You may also be interested in my [[Future Projects]], especially if you are looking for ideas. | You may also be interested in my [[Future Projects]], especially if you are looking for ideas. |
Revision as of 09:24, 23 March 2013
Welcome to Simson Garfinkel's web site.
Simson L. Garfinkel is an Associate Professor at the Naval Postgraduate School in Monterey, California. His research interests include computer forensics, usable security, personal information management, information policy and terrorism. (Read full bio.)
Recent Tutorials and Presentations
- 2013-02-22 Bulk Data Analysis With Optimistic Decompression.
- 2013-01-07 Digital Forensics Innovation: Searching A Terabyte of Data in 10 minutes (DCACM, Washington DC)
- 2012-01-11 The Cybersecurity Mess, and what SFS students can do about it.
See also my Presentations Archive
Recent Publications
- Academic
- Young J., Foster, K., Garfinkel, S., and Fairbanks, K., Distinct Sector Hashes for Target File Detection, IEEE Computer, December 2012
- Garfinkel, S. Digital Forensics XML and the DFXML toolset, Digital Investigation, 2012.
- Garfinkel, S., and Dinolt, G. Operations with Degraded Security. IEEE Security & Privacy, pages 18–23, November/December 2011
- Beverly, Robert, Simson Garfinkel and Greg Cardwell, "Forensic Carving of Network Packets and Associated Data Structures", DFRWS 2011, Aug. 1-3, 2011, New Orleans, LA BEST PAPER AWARD (Acceptance rate: 23%, 14/62)
- Journalistic
- Windows 8: Design over Usability, Technology Review, February 20, 2013
- How to Delete Regrettable Posts from the Internet, Technology Review, October 30, 2012.
- Seven Ways to get yourself hacked, Technology Review, December 15, 2011.
- A Cloud over Ownership: Online services set content free from the physical world’s constraints—including those that have defined the very idea of possession,Technology Review, August 23, 2011
Other sites of interest
|