메뉴 건너뛰기




Volumn 1, Issue 4, 2004, Pages 298-309

On the role of file system metadata in digital forensics

Author keywords

Audit data; Computer forensics; Digital forensics; File systems; Intrusion analysis

Indexed keywords

COMPUTER SOFTWARE; DATA ACQUISITION; DATA STORAGE EQUIPMENT; INFORMATION RETRIEVAL; PUBLIC POLICY; SOCIETIES AND INSTITUTIONS;

EID: 10644245884     PISSN: 17422876     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.diin.2004.10.002     Document Type: Article
Times cited : (68)

References (43)
  • 1
    • 0004048154 scopus 로고
    • Computer security threat monitoring and surveillance
    • James P. Anderson Co.; April
    • Anderson James P. Computer security threat monitoring and surveillance. Technical report, James P. Anderson Co.; April 1980.
    • (1980) Technical Report
    • Anderson James, P.1
  • 2
    • 85084162101 scopus 로고    scopus 로고
    • Providing process origin information to aid in network traceback
    • Monterey. CA; July CERIAS TR 2002-22
    • Buchholz Florian, Shields Clay. Providing process origin information to aid in network traceback. In: Proceedings of the 2002 USENIX annual technical conference. Monterey, CA; July 2002. CERIAS TR 2002-22.
    • (2002) Proceedings of the 2002 USENIX Annual Technical Conference
    • Florian, B.1    Clay, S.2
  • 3
    • 10644285176 scopus 로고    scopus 로고
    • Providing process origin information to aid in computer forensic investigations
    • Buchholz Florian, Shields Clay. Providing process origin information to aid in computer forensic investigations. Journal of Computer Security September 2004;12(5):753-76.
    • (2004) Journal of Computer Security September , vol.12 , Issue.5 , pp. 753-776
    • Florian, B.1    Clay, S.2
  • 8
    • 0036351977 scopus 로고    scopus 로고
    • A recursive session token protocol for use in computer forensics and TCP traceback
    • June
    • Carrier B, Shields C. A recursive session token protocol for use in computer forensics and TCP traceback. Proceedings of the IEEE infocomm 2002; June 2002.
    • (2002) Proceedings of the IEEE Infocomm 2002
    • Carrier, B.1    Shields, C.2
  • 9
    • 7544240929 scopus 로고    scopus 로고
    • Defining event reconstruction of digital crime scenes
    • CERIAS TR 2004-37
    • Carrier Brian D, Spafford Eugene H. Defining event reconstruction of digital crime scenes. Journal of Forensic Sciences 2004;49(6):11. CERIAS TR 2004-37.
    • (2004) Journal of Forensic Sciences , vol.49 , Issue.6 , pp. 11
    • Carrier Brian, D.1    Spafford Eugene, H.2
  • 14
    • 0013393580 scopus 로고    scopus 로고
    • Location-based authentication: Grounding Cyberspace for better security
    • ACM Press/Addison-Wesley Publishing Co
    • Denning Dorothy E, MacDoran Peter F. Location-based authentication: grounding Cyberspace for better security. In: Internet besieged: countering Cyberspace scofflaws. ACM Press/Addison-Wesley Publishing Co; 1998. p. 167-74.
    • (1998) Internet Besieged: Countering Cyberspace Scofflaws , pp. 167-174
    • Denning Dorothy, E.1    MacDoran Peter, F.2
  • 17
    • 10644255177 scopus 로고    scopus 로고
    • A toolkit for modeling and compressing audit data
    • COAST, Purdue University; COAST TR 98-20
    • Flack Chapman J, Atallah Mikhail. A toolkit for modeling and compressing audit data. Technical report, COAST, Purdue University; 1998. COAST TR 98-20.
    • (1998) Technical Report
    • Flack Chapman, J.1    Mikhail, A.2
  • 21
    • 10644256938 scopus 로고    scopus 로고
    • Law enforcement tools and technologies for investigating cyber attacks: A national needs assessment
    • Dartmouth College
    • Institute for Security Technology Studies. Law enforcement tools and technologies for investigating cyber attacks: a national needs assessment. Technical report, Dartmouth College; 2002.
    • (2002) Technical Report
  • 22
    • 33645762914 scopus 로고    scopus 로고
    • Law enforcement tools and technologies for investigating cyber attacks: Gap analysis report
    • Dartmouth College; February
    • Institute for Security Technology Studies. Law enforcement tools and technologies for investigating cyber attacks: gap analysis report. Technical report, Dartmouth College; February 2004.
    • (2004) Technical Report
  • 28
    • 10644274806 scopus 로고    scopus 로고
    • Microsoft Corporation. FAT: general overview of on-disk format. 〈http://www.microsoft.com/hwdev/download/hardware/fatgen103.pdf〉 1999.
    • (1999) FAT: General Overview of On-disk Format
  • 33
    • 1242286401 scopus 로고    scopus 로고
    • The future of computer forensics: A needs analysis survey
    • Rogers MK, Seigfried K. The future of computer forensics: a needs analysis survey. Computers & Security 2004;26.
    • (2004) Computers & Security , pp. 26
    • Rogers, M.K.1    Seigfried, K.2
  • 37
    • 10644286071 scopus 로고    scopus 로고
    • The forensic toolit. 〈http://www.accessdata.com/Product04_Overview.htm〉.
    • The Forensic Toolit
  • 39
    • 84960561455 scopus 로고
    • On computable numbers, with an application to the entscheidungsproblem
    • David M, editor. Hewlett, NY: Raven Press; [Reprinted in The Undecidable, 1965]
    • Turing AM. On computable numbers, with an application to the entscheidungsproblem. In: David M, editor. Proceedings of London Mathematical Society Series 2, vol. 42. Hewlett, NY: Raven Press; 1937. p. 230-65. [Reprinted in The Undecidable, 1965].
    • (1937) Proceedings of London Mathematical Society Series 2 , vol.42 , pp. 230-265
    • Turing, A.M.1
  • 40
    • 84960612623 scopus 로고
    • Correction to: On computable numbers, with an application to the entscheidungsproblem
    • Turing AM. Correction to: on computable numbers, with an application to the entscheidungsproblem. Proceedings of London Mathematical Society Series 2 1938;43:544-6.
    • (1938) Proceedings of London Mathematical Society Series 2 , vol.43 , pp. 544-546
    • Turing, A.M.1
  • 42
    • 10644223048 scopus 로고
    • A tool for network monitoring, access control, and for setting up booby traps
    • September
    • Venema Wietse. Tcp wrapper, a tool for network monitoring, access control, and for setting up booby traps. Proceedings of 1992 USENIX security symposium September; 1992.
    • (1992) Proceedings of 1992 USENIX Security Symposium
    • Wietse, V.1    Wrapper, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.