Memory carving can finally unveil your embedded personal data
暂无分享,去创建一个
[1] Harry Zhang,et al. The Optimality of Naive Bayes , 2004, FLAIRS.
[2] Wolfgang Rankl,et al. Smart Card Handbook , 1997 .
[3] SaltonGerard,et al. Term-weighting approaches in automatic text retrieval , 1988 .
[4] Simon Tjoa,et al. A Comprehensive Literature Review of File Carving , 2013, 2013 International Conference on Availability, Reliability and Security.
[5] Christophe Rosenberger,et al. Memory Carving in Embedded Devices: Separate the Wheat from the Chaff , 2016, ACNS.
[6] Ah-Hwee Tan,et al. Text Mining: The state of the art and the challenges , 2000 .
[7] Fred D’Aguiar. Calypso , 2019, Wasafiri.
[8] Simson L. Garfinkel,et al. Digital media triage with bulk data analysis and bulk_extractor , 2013, Comput. Secur..
[9] Michael I. Cohen. Advanced carving techniques , 2007, Digit. Investig..
[10] Paolo Palmieri,et al. Passengers information in public transport and privacy: Can anonymous tickets prevent tracking? , 2014, Int. J. Inf. Manag..
[11] Jean-Louis Lanet,et al. Memory Forensics of a Java Card Dump , 2014, CARDIS.
[12] Gerard Salton,et al. Term-Weighting Approaches in Automatic Text Retrieval , 1988, Inf. Process. Manag..
[13] L. Miles,et al. 2000 , 2000, RDH.
[14] Sjouke Mauw,et al. mCarve: Carving Attributed Dump Sets , 2011, USENIX Security Symposium.