메뉴 건너뛰기




Volumn 3, Issue 4, 2005, Pages 59-62

Computer forensics

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER FORENSICS; COMPUTER MEDIA; FINANCIAL FRAUD;

EID: 24344446965     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2005.95     Document Type: Review
Times cited : (15)

References (5)
  • 1
    • 3042810445 scopus 로고    scopus 로고
    • Recovering and examining computer forensic evidence
    • M.G. Noblett, M.M. Pollitt, and L.A. Presley, "Recovering and Examining Computer Forensic Evidence," Forensic Science Comm., vol. 2, no. 4, 2000; www.fbi.gov/hq/lab/fsc.
    • (2000) Forensic Science Comm. , vol.2 , Issue.4
    • Noblett, M.G.1    Pollitt, M.M.2    Presley, L.A.3
  • 2
    • 3042825662 scopus 로고    scopus 로고
    • Remembrance of data passed: A study of disk sanitization practices
    • S.L. Garfinkel and A. Shelat, "Remembrance of Data Passed: A Study of Disk Sanitization Practices," IEEE Security & Privacy, vol. 1, no. 1, 2003, pp. 17-27.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.1 , pp. 17-27
    • Garfinkel, S.L.1    Shelat, A.2
  • 3
    • 3042727237 scopus 로고    scopus 로고
    • Practical approaches to recovering encrypted digital evidence
    • E. Casey, "Practical Approaches to Recovering Encrypted Digital Evidence," Int'l J. Digital Evidence, vol. 1. no. 3, 2002; www.ijde.org/docs/02_fall_art4.pdf.
    • (2002) Int'l J. Digital Evidence , vol.1 , Issue.3
    • Casey, E.1
  • 5
    • 17444421583 scopus 로고    scopus 로고
    • Does trusted computing remedy computer security problems?
    • Mar./Apr.
    • R. Oppliger and R. Rytz, "Does Trusted Computing Remedy Computer Security Problems?" IEEE Security & Privacy, vol. 3, no. 2. Mar./Apr., 2005, pp. 16-19.
    • (2005) IEEE Security & Privacy , vol.3 , Issue.2 , pp. 16-19
    • Oppliger, R.1    Rytz, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.