메뉴 건너뛰기




Volumn 16, Issue 2, 2005, Pages 260-275

Study on relevant law and technology issues about computer forensics

Author keywords

Computer evidence; Computer forensics; Computer forensics tools; Crime; Evidence; Law

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER AIDED ANALYSIS; DATA MINING; INFORMATION ANALYSIS; LAW ENFORCEMENT; SECURITY OF DATA;

EID: 15744369983     PISSN: 10009825     EISSN: None     Source Type: Journal    
DOI: 10.1360/jos160260     Document Type: Article
Times cited : (26)

References (21)
  • 1
    • 0346252711 scopus 로고    scopus 로고
    • Computer forensics and its future trend
    • Chinese source
    • Wang L, Qian HL. Computer forensics and its future trend. Journal of Software, 2003, 14(9): 1635-1644 (in Chinese with English with abstract). http://www.jos.org.cn/1000-9825/14/1635.htm
    • (2003) Journal of Software , vol.14 , Issue.9 , pp. 1635-1644
    • Wang, L.1    Qian, H.L.2
  • 2
    • 14244265574 scopus 로고    scopus 로고
    • Beijing: Law Press China, Chinese source
    • Zhang P. Internet Law Review. Vol.3, Beijing: Law Press China, 2003 (in Chinese).
    • (2003) Internet Law Review
    • Zhang, P.1
  • 4
    • 15744396213 scopus 로고    scopus 로고
    • Teaching Material Writing and Editing Council in Ministry of Public Security. Beijing: The Mass Press, Chinese source
    • Teaching Material Writing and Editing Council in Ministry of Public Security. Security Supervise on Network Information. Beijing: The Mass Press, 2000 (in Chinese).
    • (2000) Security Supervise on Network Information
  • 5
    • 15744382856 scopus 로고    scopus 로고
    • Electronic evidences in e-business and its law status
    • Yang CG. Electronic evidences in e-business and its law status. 2001. http://cooltoy.yesky.com/20010118/155824_1.shtml
    • (2001)
    • Yang, C.G.1
  • 7
    • 15744375705 scopus 로고    scopus 로고
    • Computer evidence processing: The important first step-safe seizure of the computer
    • Anderson MR. Computer evidence processing: The important first step-safe seizure of the computer. http://www.forensics-intl.com
    • Anderson, M.R.1
  • 9
    • 84898327114 scopus 로고    scopus 로고
    • Electronic fingerprints--Computer evidence comes of age
    • Anderson MR. Electronic fingerprints--Computer evidence comes of age. http://www.forensics-intl.com
    • Anderson, M.R.1
  • 10
    • 15744367256 scopus 로고    scopus 로고
    • New focus on the subject of computer security - The subject of computer forensics
    • He M. New focus on the subject of computer security-The subject of computer forensics. System Security, 2002, 7: 42-43.
    • (2002) System Security , vol.7 , pp. 42-43
    • He, M.1
  • 11
    • 1242273312 scopus 로고    scopus 로고
    • An examination of digital forensics models
    • Reith M, Carr C. An examination of digital forensics models. Int'l Journal of Digital Evidence, 2002, 1(3): 1-12.
    • (2002) Int'l Journal of Digital Evidence , vol.1 , Issue.3 , pp. 1-12
    • Reith, M.1    Carr, C.2
  • 14
    • 15744383084 scopus 로고    scopus 로고
    • Internet security - Firewalls and encryption: The cyber cop's perspective
    • Anderson MR. Internet security-Firewalls and encryption: the cyber cop's perspective. http://www.forensics-intl.com/art1.html
    • Anderson, M.R.1
  • 15
    • 15744385353 scopus 로고    scopus 로고
    • Study and design of computer forensics
    • Qian GQ, Yang ZM, Xu RS. Study and design of computer forensics. Computer Engineering, 2002, 28(6): 56-58.
    • (2002) Computer Engineering , vol.28 , Issue.6 , pp. 56-58
    • Qian, G.Q.1    Yang, Z.M.2    Xu, R.S.3
  • 16
    • 0345914401 scopus 로고    scopus 로고
    • Armouring the ELF: Binary encryption on the UNIX platform
    • Phrack #58 article5
    • Armouring the ELF: Binary encryption on the UNIX platform. Phrack #58 article5. 2001. http://www.phrack.org
    • (2001)
  • 18
    • 15744402616 scopus 로고    scopus 로고
    • A summary of network intrusion traceback
    • Chinese source
    • Zhang J, Gong J. A summary of network intrusion traceback. Computer Science, 2003, 30(10): 155-166 (in Chinese with English abstract).
    • (2003) Computer Science , vol.30 , Issue.10 , pp. 155-166
    • Zhang, J.1    Gong, J.2
  • 20
    • 15744381811 scopus 로고    scopus 로고
    • Incident response tools for Unix, part one: System tools
    • Sorenson H. Incident response tools for Unix, part one: System tools. 2003. http://www.securityfocus.com/infocus/1679
    • (2003)
    • Sorenson, H.1
  • 21
    • 0038476545 scopus 로고    scopus 로고
    • A survey on software watermarking
    • Chinese source
    • Zhang LH, Yang YX, Niu XY, Niu SZ. A survey on software watermarking. Journal of Software, 2003, 14(2): 268-277 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/14/268.htm
    • (2003) Journal of Software , vol.14 , Issue.2 , pp. 268-277
    • Zhang, L.H.1    Yang, Y.X.2    Niu, X.Y.3    Niu, S.Z.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.