A Compiled Memory Analysis Tool
暂无分享,去创建一个
[1] Brendan Dolan-Gavitt,et al. Forensic analysis of the Windows registry in memory , 2008, Digit. Investig..
[2] Mark Russinovich,et al. Microsoft Windows Internals : Microsoft Windows Server 2003, Windows XP, and Windows 2000 , 2005 .
[3] Andreas Schuster,et al. Searching for processes and threads in Microsoft Windows memory dumps , 2006, Digit. Investig..
[4] W. Marsden. I and J , 2012 .
[5] Brian D. Carrier,et al. File System Forensic Analysis , 2005 .
[6] Eugene Libster,et al. A proposal for an integrated memory acquisition mechanism , 2008, OPSR.
[7] D CarrierBrian,et al. A hardware-based memory acquisition procedure for digital investigations , 2004 .
[8] Joe Grand,et al. A hardware-based memory acquisition procedure for digital investigations , 2004, Digit. Investig..
[9] Kevin Mandia,et al. Incident Response & Computer Forensics, 2nd Ed. , 2003 .
[10] Susan W. Brenner,et al. The Trojan Horse Defense in Cybercrime Cases , 2004 .
[11] Kevin Mandia,et al. Incident Response & Computer Forensics , 2003 .
[12] Theodore Tryfonas,et al. Acquiring volatile operating system data tools and techniques , 2008, OPSR.
[13] Ryan D. Pittman,et al. Windows Forensic Analysis , 2010 .
[14] Nick L. Petroni,et al. Volatools : Integrating Volatile Memory Forensics into the Digital Investigation Process , 2007 .