Laptop Theft Analysis for Digital Investigations
暂无分享,去创建一个
S. Prem Kumar | J. Keziya Rani | U. Ram Mohan | C. Uma Shankar | C. Virus | D. Worms | J. Keziya | Rani | S. Prem Kumar | U. Ram | Mohan | Uma Shankar
[1] Fred Cohen,et al. Simulating cyber attacks, defences, and consequences , 1999, Comput. Secur..
[2] Byrne Ghavalas,et al. Trojan defence: A forensic view part II , 2005, Digit. Investig..
[3] Yuxin Ding,et al. Host-based intrusion detection using dynamic and static behavioral models , 2003, Pattern Recognit..
[4] Yacov Y. Haimes,et al. Risks of Terrorism to Information Technology and to Critical Interdependent Infrastructures , 2004 .
[5] Shiuh-Jeng Wang,et al. SoTE: Strategy of Triple-E on solving Trojan defense in Cyber-crime cases , 2010, Comput. Law Secur. Rev..
[6] Matthew G. Devost,et al. Information terrorism: Political violence in the information age , 1997 .
[7] M. Griffiths,et al. Cyberstalking:a new challenge for criminal law , 2002 .
[8] Joe Grand,et al. A hardware-based memory acquisition procedure for digital investigations , 2004, Digit. Investig..