Cloud Forensic Technical Challenges and Solutions: A Snapshot
暂无分享,去创建一个
[1] Kim-Kwang Raymond Choo,et al. Distributed filesystem forensics: XtreemFS as a case study , 2014, Digit. Investig..
[2] Corrado Federici,et al. Cloud Data Imager: A unified answer to remote acquisition of cloud storage areas , 2014, Digit. Investig..
[3] Alan T. Sherman,et al. Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques , 2012, Digit. Investig..
[4] Cheng Yan. Cybercrime forensic system in cloud computing , 2011, 2011 International Conference on Image Analysis and Signal Processing.
[5] Kim-Kwang Raymond Choo,et al. Digital droplets: Microsoft SkyDrive forensic data remnants , 2013, Future Gener. Comput. Syst..
[6] Raffael Marty,et al. Cloud application logging for forensics , 2011, SAC.
[7] Kim-Kwang Raymond Choo,et al. Google Drive: Forensic analysis of data remnants , 2014, J. Netw. Comput. Appl..
[8] Kim-Kwang Raymond Choo,et al. An integrated conceptual digital forensic framework for cloud computing , 2012, Digit. Investig..
[9] Kim-Kwang Raymond Choo,et al. Dropbox analysis: Data remnants on user machines , 2013, Digit. Investig..
[10] Alan T. Sherman,et al. Design and Implementation of FROST - Digital Forensic Tools for the OpenStack Cloud Computing Platform , 2016 .
[11] Gianluigi Me,et al. A Case Study on Digital Forensics in the Cloud , 2012, 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
[12] Martin S. Olivier,et al. Isolating a cloud instance for a digital forensic investigation , 2011, ISSA.
[13] Kim-Kwang Raymond Choo,et al. Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata? , 2013, Digit. Investig..
[14] Kim-Kwang Raymond Choo,et al. Remote Programmatic vCloud Forensics: A Six-Step Collection Process and a Proof of Concept , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.
[15] Tim Storer,et al. Using Smartphones as a Proxy for Forensic Evidence Contained in Cloud Storage Services , 2013, 2013 46th Hawaii International Conference on System Sciences.
[16] ChengYan. Cybercrime forensic system in cloud computing , 2011 .
[17] Anthony Keane,et al. Digital forensics investigations in the Cloud , 2014, 2014 IEEE International Advance Computing Conference (IACC).
[18] Ragib Hasan,et al. SecLaaS: secure logging-as-a-service for cloud forensics , 2013, ASIA CCS '13.
[19] Simon Tjoa,et al. Evidence and Cloud Computing: The Virtual Machine Introspection Approach , 2013, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[20] S. Almulla,et al. Cloud forensics: A research perspective , 2013, 2013 9th International Conference on Innovations in Information Technology (IIT).
[21] Jason S. Hale. Amazon Cloud Drive forensic analysis , 2013, Digit. Investig..
[22] Kim-Kwang Raymond Choo,et al. Cloud storage forensics: ownCloud as a case study , 2013, Digit. Investig..
[23] Kurt Oestreicher,et al. A forensically robust method for acquisition of iCloud data , 2014, Digit. Investig..
[24] Zahid Anwar,et al. Digital Forensics for Eucalyptus , 2011, 2011 Frontiers of Information Technology.
[25] Kwang Sik Chung,et al. Cyber Forensic for Hadoop based Cloud System , 2012 .
[26] Sangjin Lee,et al. Digital forensic investigation of cloud storage services , 2012, Digit. Investig..
[27] Hein S. Venter,et al. Digital Forensic Framework for a Cloud Environment , 2012 .