메뉴 건너뛰기




Volumn 14, Issue 9, 2003, Pages 1635-1644

Computer forensics and its future trend

Author keywords

Anti forensics; Computer crime; Computer forensic; Computer security

Indexed keywords

COMPUTER SOFTWARE; DATA ACQUISITION; SECURITY OF DATA;

EID: 0346252711     PISSN: 10009825     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (24)

References (10)
  • 1
    • 0345914405 scopus 로고    scopus 로고
    • Computer forensics: The key to solving the crime
    • Oseles L. Computer forensics: The key to solving the crime. 2001. http://faculty.ed.umuc.edu/-meinkej/inss690/oseles_2.pdf.
    • (2001)
    • Oseles, L.1
  • 2
    • 84855216292 scopus 로고    scopus 로고
    • Computer forensics
    • Parra M. Computer forensics. 2002. http:www.giac.org/practical/Moroni_Parra_GSEC.doc.
    • (2002)
    • Parra, M.1
  • 4
    • 0347175793 scopus 로고    scopus 로고
    • Basic steps in forensic analysis of Unix systems
    • Dittrich D. Basic steps in forensic analysis of Unix systems. 2000. http://staff.washington.edu/dittrich/misc/forensics/.
    • (2000)
    • Dittrich, D.1
  • 5
    • 0346545475 scopus 로고    scopus 로고
    • Defeating forensic analysis on Unix. Phrack #59 article6
    • grugq.
    • grugq. Defeating forensic analysis on Unix. Phrack #59 article6. 2002. http://www.phrack.org/show.php?p=59&a=6.
    • (2002)
  • 6
    • 0345914404 scopus 로고    scopus 로고
    • What are MACtimes
    • Farmer D. What are MACtimes? Dr. Dobb's Journal. 2000,10. http://www.ddj.com/documents/s=880/ddj0010f/0010f.htm.
    • (2000) Dr. Dobb's Journal , vol.10
    • Farmer, D.1
  • 8
    • 0345914401 scopus 로고    scopus 로고
    • Armouring the ELF: Binary encryption on the UNIX platform
    • grugq, scut. Phrack #58 articles
    • grugq, scut. Armouring the ELF: Binary encryption on the UNIX platform. Phrack #58 articles. 2001. http://www.phrack.org/show.pnp?p=58&a=5.
    • (2001)
  • 10
    • 0004610703 scopus 로고    scopus 로고
    • Secure deletion of data from magnetic and solid-state memory
    • San Jose, California: USENIX
    • Gutmann P. Secure deletion of data from magnetic and solid-state memory. In: Proceedings of the 6th USEN1X Security Symposium. San Jose, California: USENIX, 1996. 77-90. http://www.usenix.org/publications/library/proceedings/sec96/.
    • (1996) Proceedings of the 6th USEN1X Security Symposium , pp. 77-90
    • Gutmann, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.