A new forensic model and its application to the collection, extraction and long term storage of screen content off a memory dump
暂无分享,去创建一个
[1] Klara Nahrstedt,et al. Using Cryptographic and Watermarking Algorithms , 2001, IEEE Multim..
[2] Eoghan Casey,et al. Digital Evidence and Computer Crime , 2000 .
[3] Gobinda G. Chowdhury,et al. Viewpoints on digital library issues: A brief overview of the ongoing EU project SHAMAN: Sustaining Heritage Access through Multivalent ArchiviNg , 2008, World Digit. Libr..
[4] José Luis Borbinha. SHAMAN - Sustaining Heritage Access through Multivalent Archiving , 2010, ERCIM News.
[5] nestor Arbeitsgruppe Vertrauenswürdige Archive Zertifizierung. Kriterienkatalog vertrauenswürdige digitale Langzeitarchive , 2006 .
[6] Jana Dittmann,et al. Taxonomy for Computer Security Incidents , 2007 .
[7] Felix C. Freiling,et al. A Common Process Model for Incident Response and Computer Forensics , 2007, IMF.
[8] H. Zimmermann,et al. OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection , 1980, IEEE Transactions on Communications.