Solid State Drives: The Beginning of the End for Current Practice in Digital Forensic Recovery?
暂无分享,去创建一个
[1] Mark Pollitt,et al. Computer Forensics Education , 2003, IEEE Secur. Priv..
[2] Brian D. Carrier,et al. File System Forensic Analysis , 2005 .
[3] Gregory H. Carlton,et al. An Evaluation of Agreement and Conflict Among Computer Forensics Experts , 2009, 2009 42nd Hawaii International Conference on System Sciences.
[4] Valerie Hobbs,et al. Validating digital evidence for legal argument , 2008 .
[5] Eugene H. Spafford,et al. Getting Physical with the Digital Investigation Process , 2003, Int. J. Digit. EVid..
[6] Michael A. Caloyannides. Computer Forensics and Privacy , 2001 .
[7] Erik C. Berg,et al. Legal Ramifications of Digital Imaging in Law Enforcement , 2000 .
[8] Erin E. Kenneally,et al. Risk sensitive digital evidence collection , 2005, Digit. Investig..
[9] M. B. Mukasey,et al. Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition , 2008 .
[10] Gary Drossel. Solid-state drives meet military storage security requirements , 2007 .
[11] Karl J. Flusche. Computer Forensic Case Study: Espionage, Part 1 Just Finding the File is Not Enough! , 2001, Inf. Secur. J. A Glob. Perspect..
[12] Xiaodong Zhang,et al. Understanding intrinsic characteristics and system implications of flash memory based solid state drives , 2009, SIGMETRICS '09.
[13] Akira Goto,et al. Intellectual Property Rights, Development, and Catch Up: An International Comparative Study , 2012 .
[14] Michael Losavio,et al. Gap Analysis: Judicial Experience and Perception of Electronic Evidence , 2006, J. Digit. Forensic Pract..
[15] Simon Janes. The Role of Technology in Computer Forensic Investigations , 2000, Inf. Secur. Tech. Rep..