Digital Forensic Analysis Process Essays

On By In 1
  • 1.

    Worring, M., Cucchiara, R.: Multimedia in Forensics. In: Communication of the ACM, MM 2009, October 19–24, pp. 1153–1154 (2009)Google Scholar

  • 2.

    Yen, P.-H., Yang, C.-H., Ahn, T.-N.: Design and Implementation of a Live-analysis Digital Forensic System. In: Communication of the ACM in International Conference on Convergence and Hybrid Information Technology, pp. 239–242 (2009)Google Scholar

  • 3.

    Simson, L., Garfinkel: Digital forensics research: The next 10 years. Digital Forensic Research Workshop in Science Direct, digital investigation 7, 64–73 (2010)http//doi:0.1016/j.diin Google Scholar

  • 4.

    Olsson, J., Boldt, M.: Computer forensic timeline visualization tool. Digital Forensic Research Workshop, digital investigation 6, S78–S87 (2009); http:// doi:10.1016/j.diinCrossRefGoogle Scholar

  • 5.

    Nance, K., Hay, B., Bishop, M.: Digital Forensics: Defining a Research Agenda. In: Proceedings of the 42nd Hawaii International Conference on System Sciences, pp. 1–6. IEEE computer society, Los Alamitos (2009)Google Scholar

  • 6.

    Balon, N., Stovall, R., Scaria, T.: Computer Intrusion Forensics research paper, pp.1-24 (2002)Google Scholar

  • 7.

    Aggarwal, S., Duan, Z., Kermes, L., de Medeiros, B.: E-Crime Investigative Technologies. In: Proceedings of the 41st Hawaii International Conference on System Science in IEEE, pp. 1–10 (2008)Google Scholar

  • 8.

    Cohen, M.I.: PyFlag: PyFlag-An advanced network forensic framework. In: Communication of the ACM, digital investigation, 5th edn., pp. 112–120 (2008); Digital Forensic Research Workshop, http:// doi: 10.1016/ j.diin.2008.05.016Google Scholar

  • 9.

    Crim, J.: Digital forensic tools and identifications, Information Security Analyst, Virginia Commonwealth University, available at Site, http://liveview.sourceforge.net

  • 10.

    Bradford, P.G., Perdue, M.B.J.: Towards Proactive Computer-System Forensics. In: Proceedings of the International Conference on Information Technology Coding and Computing (ITCC 2004). IEEE computer Society, Los Alamitos (2004)Google Scholar

  • 11.

    Carrier, B.: Defining Digital Forensics Examination and Analysis Tools Using Abstraction Layers. International Journal of Digital Evidence 1(4) (2003), http://www.ijde.org/docs/02_winter_art2.pdf

  • 12.

    Carrier, B.: Open Source Digital Forensics Tools. The Legal Argument1, as a stake search Report pp.1-11 (2002), www.atstake.com/researchreports/acrobat/atstake_opensource_forensics.Pdf

  • 13.

    Carrier, B.: Defining Digital Forensics Examination and Analysis Tools. In: Digital Research Workshop II (2002), http://www.dfrws.org/dfrws/papers/Papers/Briancarrier.pdf

  • Но он настолько устал, что ему было не до любопытства. Сидя в одиночестве и собираясь с мыслями, Беккер посмотрел на кольцо на своем пальце. Зрение его несколько прояснилось, и ему удалось разобрать буквы.

    0 comments

    Leave a Reply

    Your email address will not be published. Required fields are marked *