Advances in computer forensics
暂无分享,去创建一个
Abdul Azim Abd Ghani | Abu Bakar Sultan | Ramlan Mahmod | Mohd Zain Abdullah | A. B. Sultan | R. Mahmod | A. Ghani
[1] Nicole Beebe,et al. A hierarchical, objectives-based framework for the digital investigations process , 2005, Digit. Investig..
[2] Gregory A. Hall,et al. Toward Defining the Intersection of Forensics and Information Technology , 2005, Int. J. Digit. EVid..
[3] Eoghan Casey,et al. Digital Evidence and Computer Crime , 2000 .
[4] George M. Mohay,et al. Gender-preferential text mining of e-mail discourse , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[5] Lawrence A. Presley,et al. Recovering and Examining Computer Forensic Evidence , 2000 .
[6] Dulal C. Kar,et al. Computer forensics: a critical need in computer science programs , 2005 .
[7] Malcolm W. Corney,et al. Analysing e-mail text authorship for forensic purposes , 2003 .
[8] S. Ford,et al. Hard evidence from computers , 1997 .
[9] Lee Garber,et al. Computer Forensics: High-Tech Law Enforcement , 2001, Computer.
[10] Mark Pollitt,et al. Computer Forensics Education , 2003, IEEE Secur. Priv..
[11] Jesse D. Kornblum. The Linux Kernel and the Forensic Acquisition of Hard Discs with an Odd Number of Sectors , 2004, Int. J. Digit. EVid..
[12] Rodney McKemmish,et al. What is forensic computing , 1999 .
[13] P. Sommer. Downloads, Logs and Captures: Evidence from Cyberspace , 1997 .
[14] Chet Hosmer,et al. Can Digital Evidence Endure the Test of Time , 2002 .
[15] Ahmed Patel,et al. Finite state machine approach to digital event reconstruction , 2004, Digit. Investig..
[16] M. P. F. C. A. J. Sammes BSc,et al. Forensic Computing , 2000, Practitioner Series.
[17] S. Avramov-Zamurovic,et al. Hard disk interface used in computer forensic science , 2004, Proceedings of the 21st IEEE Instrumentation and Measurement Technology Conference (IEEE Cat. No.04CH37510).
[18] Robert Slade. Software Forensics : Collecting Evidence from the Scene of a Digital Crime , 2004 .
[19] Chet Hosmer. Proving the Integrity of Digital Evidence with Time , 2002, Int. J. Digit. EVid..
[20] Seamus O. Ciardhuáin,et al. An Extended Model of Cybercrime Investigations , 2004, Int. J. Digit. EVid..
[21] Bill Nelson,et al. Guide to Computer Forensics and Investigations , 2003 .
[22] Eugene H. Spafford,et al. A digital investigation process model , 2004 .
[23] Stephen G. MacDonell,et al. Forensics : : old methods for a new science , 2004 .
[24] Warren G. Kruse,et al. Computer Forensics: Incident Response Essentials , 2001 .
[25] Brian D. Carrier,et al. Defining event reconstruction of digital crime scenes. , 2004, Journal of forensic sciences.
[26] George M. Mohay,et al. Computer and Intrusion Forensics , 2003 .
[27] Olivier de Vel,et al. Mining E-mail Authorship , 2000 .
[28] Kevin Mandia,et al. Incident Response & Computer Forensics , 2003 .
[29] Megan Carney,et al. The Trojan Made Me Do It: A First Step in Statistical Based Computer Forensics Event Reconstruction , 2004, Int. J. Digit. EVid..
[30] Henry B. Wolfe. Encountering Encrypted Evidence (potential) , 2002 .
[31] Eric Cole,et al. Taking a lesson from stealthy rootkits , 2004, IEEE Security & Privacy Magazine.
[32] Peter Stephenson. Modeling of Post-Incident Root Cause Analysis , 2003, Int. J. Digit. EVid..
[33] M. B. Mukasey,et al. Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition , 2008 .
[34] Bruce Schneier,et al. Secure audit logs to support computer forensics , 1999, TSEC.
[35] William H. Allen. Computer Forensics , 2005, IEEE Secur. Priv..
[36] Paul Turner,et al. Intrusion detection: issues and challenges in evidence acquisition , 2004 .
[37] Eoghan Casey. Practical Approaches to Recovering Encrypted Digital Evidence , 2002, Int. J. Digit. EVid..
[38] Michael S. Greenberg,et al. Network Forensics Analysis , 2002, IEEE Internet Comput..
[39] Gregg H. Gunsch,et al. An Examination of Digital Forensic Models , 2002, Int. J. Digit. EVid..
[40] Hal Berghel. The discipline of Internet forensics , 2003, CACM.