Guidelines on PDA Forensics
暂无分享,去创建一个
[1] Gregg H. Gunsch,et al. An Examination of Digital Forensic Models , 2002, Int. J. Digit. EVid..
[2] Pascal Meunier,et al. ActiveSync, TCP/IP and 802.11b wireless vulnerabilities of WinCE-based PDAs , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[3] Kingpin Kingpin,et al. Security Analysis of the Palm Operating System and its Weaknesses Against Malicious Code Threats , 2001, USENIX Security Symposium.
[4] Joseph Grand. pdd: Memory Imaging and Forensic Analysis of Palm OS Devices , 2002 .