Follow
Marcus Rogers
Marcus Rogers
Professor of Digital Forensics, Purdue University
Verified email at purdue.edu
Title
Cited by
Cited by
Year
Computer forensics field triage process model
MK Rogers, J Goldman, R Mislan, T Wedge, S Debrota
Journal of Digital Forensics, Security and Law 1 (2), 2, 2006
3212006
The future of computer forensics: a needs analysis survey
MK Rogers, K Seigfried
Computers & Security 23 (1), 12-16, 2004
2312004
A social learning theory and moral disengagement analysis of criminal computer behavior: An exploratory study
MK Rogers
1942001
A two-dimensional circumplex approach to the development of a hacker taxonomy
MK Rogers
Digital investigation 3 (2), 97-102, 2006
1382006
A cyber forensics ontology: Creating a new approach to studying cyber forensics
A Brinson, A Robinson, M Rogers
digital investigation 3, 37-43, 2006
1192006
Self-reported computer criminal behavior: A psychological analysis
MK Rogers, K Seigfried, K Tidke
digital investigation 3, 116-120, 2006
1002006
Does deviant pornography use follow a Guttman-like progression?
KC Seigfried-Spellar, MK Rogers
Computers in Human Behavior 29 (5), 1997-2003, 2013
902013
Self-Reported Online Child Pornography Behavior: A Psychological Analysis.
KC Seigfried, RW Lovely, MK Rogers
International Journal of Cyber Criminology 2 (1), 2008
732008
Drone forensic framework: Sensor and data identification and verification
U Jain, M Rogers, ET Matson
2017 IEEE Sensors Applications Symposium (SAS), 1-6, 2017
722017
The psyche of cybercriminals: A psycho-social perspective
MK Rogers
Cybercrimes: A multidisciplinary analysis, 217-235, 2010
712010
A control model of the movement of attention
JG Taylor, M Rogers
Neural Networks 15 (3), 309-326, 2002
692002
Hidden disk areas: HPA and DCO
MR Gupta, MD Hoeschele, MK Rogers
International Journal of Digital Evidence 5 (1), 1-8, 2006
542006
Applying traditional military principles to cyber warfare
S Liles, JE Dietz, M Rogers, D Larson
2012 4th International Conference on Cyber Conflict (CYCON 2012), 1-12, 2012
522012
Forensic analysis of volatile instant messaging
M Kiley, S Dankner, M Rogers
Advances in Digital Forensics IV 4, 129-138, 2008
452008
Mobile phone forensics tool testing: A database driven approach
IM Baggili, R Mislan, M Rogers
International Journal of Digital Evidence 6 (2), 168-178, 2007
432007
Detecting social engineering
M Hoeschele, M Rogers
Advances in Digital Forensics: IFIP International Conference on Digital …, 2005
372005
The development of a meaningful hacker taxonomy: A two dimensional approach
M Rogers
Retrieved January 23 (2007), 2005-43, 2005
362005
A scoping review of child grooming strategies: Pre-and post-internet
TR Ringenberg, KC Seigfried-Spellar, JM Rayz, MK Rogers
Child Abuse & Neglect 123, 105392, 2022
342022
Digital forensics: Meeting the challenges of scientific evidence
M Meyers, M Rogers
Advances in Digital Forensics: IFIP International Conference on Digital …, 2005
342005
Self-reported cyber crime: An analysis on the effects of anonymity and pre-employment integrity
I Baggili, M Rogers
322009
The system can't perform the operation now. Try again later.
Articles 1–20