Digital Forensic Artifacts of the Cortana Device Search Cache on Windows 10 Desktop
暂无分享,去创建一个
[1] Yogesh Khatri,et al. Forensic implications of System Resource Usage Monitor (SRUM) data in Windows 8 , 2015, Digit. Investig..
[2] G. Stevenson Smith. Using jump lists to identify fraudulent documents , 2013, Digit. Investig..
[3] Christopher James Hargreaves,et al. Forensic data recovery from the Windows Search Database , 2011, Digit. Investig..
[4] Alexander G. Barnett. The Forensic Value of the Windows 7 Jump List , 2011, ICDF2C.
[5] Khaled M. Alhawiti. Advances in Artificial intelligence Using Speech Recognition , 2015 .
[6] Howard Chivers,et al. Private browsing: A window of forensic opportunity , 2014, Digit. Investig..
[7] Sangjin Lee,et al. Structure and application of IconCache.db files for digital forensics , 2014, Digit. Investig..
[8] Upasna Singh,et al. A forensic insight into Windows 10 Jump Lists , 2016, Digit. Investig..
[9] Jan Collie,et al. The windows IconCache.db: A resource for forensic artifacts from USB connectable devices , 2013, Digit. Investig..
[10] Derrick J. Farmer. A FORENSIC ANALYSIS OF THE WINDOWS REGISTRY , 2007 .
[11] Pete Forster,et al. Time and date issues in forensic computing - a case study , 2004, Digit. Investig..