Accepted Peer-Reviewed Work Awaiting Publication (i.e., In Press)
●
Publications
● Carlton, G.H. and Kessler, G.C. (2018), Disconnects of specialized mobile forensics within the generalized field of digital forensic science. International Journal of Interdisciplinary Telecommunications and Networking; Volume 10, Issue 3.
● Carlton, G.H. and Kessler, G.C. (2018), A study of forensic imaging to evaluate unsanitized destination storage media. International Journal of Interdisciplinary Telecommunications and Networking; Volume 10, Issue 3.
● Kessler, G.C. and Carlton, G.H. (2017). Exploring Myths in Digital Forensics: Separating Science From Ritual. International Journal of Interdisciplinary Telecommunications and Networking; Volume 9, Issue 4, 1-9.
● Kessler, G.C. and Carlton, G.H. (2014). A study of forensic imaging in the absence of write-blockers. Journal of Digital Forensics, Security, and Law; Volume 9, Number 3, 51-58
● Carlton, G.H. (2013). A simple experiment with Microsoft Office 2010 and Windows 7 utilizing digital forensic methodology. Journal of Digital Forensics, Security, and Law; Volume 8, Number 1, 17-37.
● Carlton, G.H. and Kessler, G.C. (2012). Identifying trace evidence in data wiping application software. Journal of Digital Forensics, Security, and Law; Volume 7, Number 2, 113-142.
● Carlton, G.H. and Matsumoto, J. (2011). A survey of contemporary enterprise storage technologies from a digital forensics perspective. Journal of Digital Forensics, Security, and Law; Volume 6, Number 3, 63-74.
● Carlton, G.H. and Zhou, H. (2011). A survey of cloud computing challenges from a digital forensics perspective. International Journal of Interdisciplinary Telecommunications and Networking; Volume 3, Issue 4, 1-16.
● Carlton, G.H. and Worthley, R. (2010). Identifying a Computer Forensics Expert: A Study to Measure the Characteristics of Forensic Computer Examiners. Journal of Digital Forensics, Security, and Law; Volume 5, Number 1. 5-20.
● Carlton, G.H. and Worthley, R. (2009). An Evaluation of Agreement and Conflict Among Computer Forensics Experts. Proceedings of the 42nd Annual Hawaii International Conference on Systems Sciences; p. 277.
● Carlton, G.H. (2008) An Evaluation of Windows-based Computer Forensics Application Software Running on a Macintosh. Journal of Digital Forensics, Security, and Law; Volume 3, Number 3. 43-60.
● Carlton, G.H. (2006). A Grounded Theory Approach to Identifying and Measuring Forensic Data Acquisition Tasks. Journal of Digital Forensics, Security and Law; Volume 2, Number 1, 35-56.
● Carlton, G.H. (2006). Forensic Data Acquisition Task Performance Guide – The Identification and Measurement of a Protocol for the Forensic Data Acquisition of Personal Computer Workstations, http://htcia.org
● Carlton, G.H. (2006). A Protocol for the Forensic Data Acquisition of Personal Computer Workstations. Dissertation Abstracts International, (UMI No. 3251043)
● Carlton, G.H. (2005). A Critical Evaluation of the Treatment of Deleted Files in Microsoft Windows Operating Systems, Proceedings of the 38th Annual Hawaii International Conference on Systems Sciences; p. 310C.
Conference Presentations
● Carlton, G.H. (2016) Contemporary Headlines in Mobile and Digital Forensics. Wireless Telecommunications Symposium, London, UK,.
● Kessler, G.C., Carlton, G.H. (2015) Exploring Myths in Digital Forensics. Proceedings of the American Academy of Forensics Sciences, p. 495.
● Carlton, G.H. (2014) "Digital Forensics and Mobile Devices," Proceedings of the 13th Annual Wireless Telecommunications Sympoisum, Washington, D.C.
● Carlton, G.H., Worthley, R. (2009) An Evaluation of Agreement and Conflict Among Computer Forensics Experts. Proceedings of the 42nd Annual Hawaii International Conference on Systems Sciences, p. 277.
● Carlton, G.H. (2008) Computer Forensics Methodology - Protection After Security Fails. Proceedings of the 7th Annual Wireless Telecommunications Symposium, Pomona, CA.
● Carlton, G.H. (2007) The Forensic Data Acquisition Task Performance Guide. High Technology Crime Investigation Association International 2007 Conference and Exposition, San Diego, CA
● Carlton, G.H. (2005) A Critical Evaluation of the Treatment of Deleted Files in Microsoft Windows Operation Systems. Proceedings of the 38th Annual Hawaii International Conference on System Sciences, p. 310.
Broadcast Presentations
● 2009 Time Warner Cable Local Edition 5-minute segment on CNN Headlines News discussing Online Computer Safety broadcasted multiple occurrences between March 30, 2009 and April 5, 2009, at 24 or 54 minutes past the hour.
● 2007 Time Warner Cable Local Edition 5-minute segment on CNN Headlines News discussing Computer Forensics broadcasted multiple occurrences between October 29, 2007 and November 2, 2007, at 24 or 54 minutes past the hour.