Automated Construction of a False Digital Alibi
暂无分享,去创建一个
Giuseppe Cattaneo | Alfredo De Santis | Aniello Castiglione | Giancarlo De Maio | Mario Ianulardo | A. D. Santis | Aniello Castiglione | G. Cattaneo | Mario Ianulardo | G. Maio
[1] Abraham Silberschatz,et al. Operating System Concepts , 1983 .
[2] Peter Gutmann,et al. Secure deletion of data from magnetic and solid-state memory , 1996 .
[3] Emmanuel Aroms. NIST Special Publication 800-88 Guidelines for Media Sanitization , 2012 .
[4] Giuseppe Cattaneo,et al. Automatic, Selective and Secure Deletion of Digital Evidence , 2011, 2011 International Conference on Broadband and Wireless Computing, Communication and Applications.
[5] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[6] Giovanni Di Crescenzo,et al. Detecting Anomalies in Active Insider Stepping Stone Attacks , 2011, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[7] Abraham Silberschatz,et al. Operating System Concepts 7th Edition with Java 7th Edition , 2006 .
[8] M. Berger. What has a decade of Daubert wrought? , 2005, American journal of public health.
[9] Donald E. Shelton. The 'CSI Effect': Does it Really Exist? , 2008 .
[10] Craig S. Wright,et al. Overwriting Hard Drive Data: The Great Wiping Controversy , 2008, ICISS.
[11] Theodore Tryfonas,et al. The Windows Registry as a forensic artefact: Illustrating evidence collection for Internet usage , 2006, Digit. Investig..
[12] R. Knight,et al. Forensic identification using skin bacterial communities , 2010, Proceedings of the National Academy of Sciences.