Computer forensics-digitized science
暂无分享,去创建一个
[1] James Tetteh Ami-Narh,et al. Digital forensics and the legal system: A dilemma of our times , 2008 .
[2] Matthew Geiger,et al. Evaluating Commercial Counter-Forensic Tools , 2005, DFRWS.
[3] Bret Dunbar,et al. A detailed look at Steganographic Techniques and their use in an Open-Systems Environment , 2002 .
[4] Paresh Kerai. Remote Access Forensics for Vnc and Rdp on Windows Platform , 2012 .
[5] Valerie Hobbs,et al. The Advanced Data Acquisition Model (ADAM): A Process Model for Digital Forensic Practice , 2013, J. Digit. Forensics Secur. Law.
[6] Simson L. Garfinkel,et al. Forensic feature extraction and cross-drive analysis , 2006, Digit. Investig..
[7] Krishnun Sansurooah. A forensics overview and analysis of USB flash memory devices , 2009 .
[8] Venansius Baryamureeba,et al. The Enhanced Digital Investigation Process Model , 2004 .
[9] Eoghan Casey,et al. Handbook of Digital Forensics and Investigation , 2009 .
[10] Lawrence A. Presley,et al. Recovering and Examining Computer Forensic Evidence , 2000 .
[11] Nicole Beebe,et al. A hierarchical, objectives-based framework for the digital investigations process , 2005, Digit. Investig..
[12] Eugene H. Spafford,et al. Getting Physical with the Digital Investigation Process , 2003, Int. J. Digit. EVid..
[13] SangJin Lee,et al. Data hiding in windows executable files , 2008 .
[14] Gregg H. Gunsch,et al. An Examination of Digital Forensic Models , 2002, Int. J. Digit. EVid..