What’s in the Cloud? - An examination of the impact of cloud storage usage on the browser cache.
暂无分享,去创建一个
[1] Alan T. Sherman,et al. Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques , 2012, Digit. Investig..
[2] Ali Dehghantanha,et al. Cloud Forensics Issues and Opportunities , 2013 .
[3] Graeme Horsman,et al. Framework for Reliable Experimental Design (FRED): A research framework to ensure the dependable interpretation of digital data for digital forensics , 2018, Comput. Secur..
[4] Shams Zawoad,et al. Digital Forensics in the Cloud , 2013 .
[5] Michael Cooke. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications , 2017 .
[6] Mohand Tahar Kechadi,et al. Cloud Forensics , 2011, IFIP Int. Conf. Digital Forensics.
[7] Graeme Horsman. Reconstructing streamed video content: A case study on YouTube and Facebook Live stream content in the Chrome web browser cache , 2018, Digit. Investig..
[8] Tim Storer,et al. Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics , 2014, Int. J. Digit. Crime Forensics.
[9] Lei Chen,et al. Cloud Storage Client Application Analysis , 2015 .
[10] Kim-Kwang Raymond Choo,et al. Digital forensics in the cloud era: the decline of passwords and the need for legal reform , 2016 .
[11] Anthony Keane,et al. Digital forensics investigations in the Cloud , 2014, 2014 IEEE International Advance Computing Conference (IACC).
[12] Joshua James,et al. A survey of mutual legal assistance involving digital evidence , 2016, Digit. Investig..
[13] Kim-Kwang Raymond Choo,et al. Cloud Storage Forensics , 2013, Contemporary Digital Forensic Investigations of Cloud and Mobile Applications.
[14] Steven Furnell,et al. Cloud Forensics: A Review of Challenges, Solutions and Open Problems , 2015, 2015 International Conference on Cloud Computing (ICCC).
[15] Ali Dehghantanha,et al. Cloud storage forensics: MEGA as a case study , 2017 .
[16] Kim-Kwang Raymond Choo,et al. Mobile cloud forensics: An analysis of seven popular Android apps , 2015, The Cloud Security Ecosystem.
[17] Prashant Pandey,et al. Cloud computing , 2010, ICWET.
[18] Alan T. Sherman,et al. UNDERSTANDING ISSUES IN CLOUD FORENSICS: TWO HYPOTHETICAL CASE STUDIES , 2011 .
[19] Ragib Hasan,et al. I Have the Proof: Providing Proofs of Past Data Possession in Cloud Forensics , 2012, 2012 International Conference on Cyber Security.
[20] Stefanos Gritzalis,et al. Cloud Forensics: Identifying the Major Issues and Challenges , 2014, CAiSE.
[21] Graeme Horsman,et al. I didn't see that! An examination of internet browser cache behaviour following website visits , 2018, Digit. Investig..
[22] Eoghan Casey,et al. Transdisciplinary strategies for digital investigation challenges , 2018, Digit. Investig..
[23] Gianluigi Me,et al. A Case Study on Digital Forensics in the Cloud , 2012, 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
[24] Shahrzad Zargari,et al. Cloud Forensics: Concepts, Issues, and Challenges , 2012, 2012 Third International Conference on Emerging Intelligent Data and Web Technologies.
[25] Christoph Wegener,et al. Technical Issues of Forensic Investigations in Cloud Computing Environments , 2011, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.
[26] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .