Email forensic tools : A roadmap to email header analysis through a cybercrime use case
暂无分享,去创建一个
[1] K. K. Arthur. An Investigation Into Computer Forensic Tools , 2004, ISSA.
[2] Ricci S. C. Ieong,et al. FORZA - Digital forensics investigation framework that incorporate legal issues , 2006, Digit. Investig..
[3] Gregg H. Gunsch,et al. An Examination of Digital Forensic Models , 2002, Int. J. Digit. EVid..
[4] Marwan Al-Zarouni,et al. Tracing E-mail Headers , 2004, Australian Computer, Network & Information Forensics Conference.
[5] Hossain Shahriar,et al. A Comparative Study of Email Forensic Tools , 2015 .
[6] Matt Bishop,et al. Digital Forensics: Defining a Research Agenda , 2009 .
[7] Peter W. Resnick,et al. Internet Message Format , 2001, RFC.
[8] Eoghan Casey. The need for knowledge sharing and standardization , 2004, Digit. Investig..
[9] M. Tariq Banday,et al. Techniques and Tools for Forensic Investigation of E-mail , 2011 .
[10] Matthew Geiger,et al. Evaluating Commercial Counter-Forensic Tools , 2005, DFRWS.
[11] Justin W. Paglierani. A Framework for Extended Acquisition and Uniform Representation of Forensic Email Evidence , 2013 .
[12] Simson L. Garfinkel,et al. Digital forensics research: The next 10 years , 2010, Digit. Investig..
[13] Mjh Lim,et al. Computational intelligence in E-mail trafficanalysis , 2008 .
[14] Jan H. P. Eloff,et al. Framework for a Digital Forensic Investigation , 2006, ISSA.
[15] Axel W. Krings,et al. A Formalization of Digital Forensics , 2004, Int. J. Digit. EVid..
[16] Dave Crocker,et al. Internet Mail Architecture , 2009, RFC.
[17] Stephen Flowerday,et al. Towards a Standardised Digital Forensic Process: E-mail Forensics , 2010, ISSA.
[18] Natarajan Meghanathan,et al. Tools and techniques for Network Forensics , 2010, ArXiv.
[19] Keith W. Ross,et al. Computer networking - a top-down approach featuring the internet , 2000 .