Digital Forensic Analysis of Cybercrimes: Best Practices and Methodologies
暂无分享,去创建一个
[1] Amir Mohamed Talib,et al. Towards a Comprehensive Ontology Based-Investigation for Digital Forensics Cybercrime , 2015 .
[2] Jonathan Ham,et al. Network Forensics: Tracking Hackers through Cyberspace , 2012 .
[3] Shahrin Sahib,et al. Mapping Process of Digital Forensic Investigation Framework , 2008 .
[4] Warren G. Kruse,et al. Computer Forensics: Incident Response Essentials , 2001 .
[5] Ahmad Ashari,et al. A Proposed Digital Forensics Business Model to Support Cybercrime Investigation in Indonesia , 2015 .
[6] Sundresan Perumal. Digital Forensic Model Based On Malaysian Investigation Process , 2009 .
[7] Ankit Agarwal,et al. Systematic Digital Forensic Investigation Model , 2011 .
[8] Marcus K. Rogers,et al. Computer Forensics Field Triage Process Model , 2006, J. Digit. Forensics Secur. Law.
[9] Walter Stechele,et al. Default Reasoning for Forensic Visual Surveillance based on Subjective Logic and Its Comparison with L-Fuzzy Set Based Approaches , 2011, Int. J. Multim. Data Eng. Manag..
[10] Isaca. Transforming Cybersecurity: Using COBIT 5 , 2013 .
[11] Venansius Baryamureeba,et al. The Enhanced Digital Investigation Process Model , 2004 .
[12] Md Rezaul Karim,et al. The Influencing Factors Associated with Ketosis-Prone Type 2 Diabetes Mellitus: A Syndrome of Diabetes Mellitus , 2018 .
[13] Avinash J. Agrawal,et al. A Digital Forensics Investigation Model for Social Networking Site , 2016, ICTCS.
[14] Petar Cisar,et al. Cybercrime and Digital Forensics – Technologies and Approaches , 2014 .
[15] Bryanna Hahn Fox,et al. Federal Bureau of Investigation (FBI) , 2015 .
[16] Gregg H. Gunsch,et al. An Examination of Digital Forensic Models , 2002, Int. J. Digit. EVid..
[17] Nilakshi Jain,et al. Digital forensic framework using feedback and case history keeper , 2015, 2015 International Conference on Communication, Information & Computing Technology (ICCICT).
[18] Zainuddin Hassan,et al. COMMON PHASES OF COMPUTER FORENSICS INVESTIGATION MODELS , 2011 .
[19] Ricci S. C. Ieong,et al. FORZA - Digital forensics investigation framework that incorporate legal issues , 2006, Digit. Investig..
[20] Vishal R. Ambhire. Digital Forensic Tools , 2012 .
[21] Seamus O. Ciardhuáin,et al. An Extended Model of Cybercrime Investigations , 2004, Int. J. Digit. EVid..
[22] Eoghan Casey,et al. Digital Evidence and Computer Crime , 2000 .
[23] Nicole Beebe,et al. A hierarchical, objectives-based framework for the digital investigations process , 2005, Digit. Investig..
[24] Jan H. P. Eloff,et al. Framework for a Digital Forensic Investigation , 2006, ISSA.
[25] B. B. Meshram,et al. Digital Forensics and Cyber Crime Datamining , 2012, J. Information Security.
[26] Rajdeep Niyogi,et al. A Generic Framework for Network Forensics , 2010 .
[27] Timothy Grance,et al. Guide to Integrating Forensic Techniques into Incident Response , 2006 .
[28] M. Khatir,et al. Two-Dimensional Evidence Reliability Amplification Process Model for Digital Forensics , 2008, 2008 Third International Annual Workshop on Digital Forensics and Incident Analysis.
[29] Jp Venter. Process flows for cyber forensic training and operations , 2006 .
[30] Budi Arief,et al. Understanding Cybercrime from Its Stakeholders' Perspectives: Part 1--Attackers , 2015, IEEE Security & Privacy.