A Literature review on Cyber Forensic and its Analysis tools
暂无分享,去创建一个
[1] Misha Pavel,et al. The exploration & forensic analysis of computer usage data in the elderly , 2009, 2009 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[2] Stefan Balogh,et al. Capturing encryption keys for digital analysis , 2011, Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems.
[3] Wei Chen,et al. The analysis and design of Linux file system based on computer forensic , 2010, 2010 International Conference On Computer Design and Applications.
[4] Gerald Quirchmayr,et al. A Prototype for Support of Computer Forensic Analysis Combined with the Expected Knowledge Level of an Attacker to More Efficiently Achieve Investigation Results , 2010, 2010 International Conference on Availability, Reliability and Security.
[5] George M. Mohay,et al. A Model for Computer Profiling , 2010, 2010 International Conference on Availability, Reliability and Security.
[6] Siu-Ming Yiu,et al. Protecting Digital Data Privacy in Computer Forensic Examination , 2011, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.
[7] Sriram Raghavan,et al. A study of forensic & analysis tools , 2013, 2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE).
[8] Yongge Wang,et al. Fast and Secure Magnetic WORM Storage Systems , 2003, Second IEEE International Security in Storage Workshop.
[9] B. Ramani,et al. Towards successful forensic recovery of bitlocked volumes , 2011, 2011 6th International Conference on System of Systems Engineering.
[10] Simson L. Garfinkel,et al. Digital forensics research: The next 10 years , 2010, Digit. Investig..
[11] Aleksandra Mileva,et al. Computer forensic analisys of some web attacks , 2014, World Congress on Internet Security (WorldCIS-2014).
[12] Ajeet Singh Poonia,et al. Live forensics analysis: Violations of business security policy , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).
[13] Keyu Jiang,et al. An Analysis System for Computer Forensic Education, Training, and Awareness , 2012, 2012 International Conference on Computing, Measurement, Control and Sensor Network.
[14] James B. D. Joshi,et al. A Similarity based Technique for Detecting Malicious Executable files for Computer Forensics , 2006, 2006 IEEE International Conference on Information Reuse & Integration.
[15] Shaheed Zulfikar,et al. Triage in Live Digital Forensic Analysis , 2013 .
[17] Alec Yasinsac,et al. Policies to Enhance Computer and Network Forensics , 2001 .
[18] Yu Zhou,et al. The forensic analysis of encrypted Truecrypt volumes , 2014, 2014 IEEE International Conference on Progress in Informatics and Computing.
[19] Eduardo R. Hruschka,et al. Document Clustering for Forensic Computing: An Approach for Improving Computer Inspection , 2011, 2011 10th International Conference on Machine Learning and Applications and Workshops.
[20] Sangjin Lee,et al. Applying a Stepwise Forensic Approach to Incident Response and Computer Usage Analysis , 2009, 2009 2nd International Conference on Computer Science and its Applications.