메뉴 건너뛰기




Volumn 49, Issue 2, 2006, Pages 76-80

Next-generation digital forensics

Author keywords

[No Author keywords available]

Indexed keywords

ANALYSIS TECHNIQUES; COMPUTER CLUSTERS; DIGITAL FORENSICS; DISTRIBUTED PROCESSING;

EID: 33745203008     PISSN: 00010782     EISSN: 00010782     Source Type: Journal    
DOI: 10.1145/1113034.1113074     Document Type: Review
Times cited : (113)

References (10)
  • 1
    • 3042731401 scopus 로고    scopus 로고
    • A hardware-based memory acquisition procedure for digital investigations
    • Feb.
    • Carrier, B. and Grand, J. A hardware-based memory acquisition procedure for digital investigations. Digital Investigation 1, 1 (Feb. 2004).
    • (2004) Digital Investigation , vol.1 , pp. 1
    • Carrier, B.1    Grand, J.2
  • 4
    • 0042367634 scopus 로고    scopus 로고
    • Mining email content for author identification forensics
    • de Vel, O.Y., Anderson, A., Corney, M. and Mohay, G.M. Mining email content for author identification forensics. SIGMOD Record 30, 4 (2001).
    • (2001) SIGMOD Record , vol.30 , pp. 4
    • De Vel, O.Y.1    Anderson, A.2    Corney, M.3    Mohay, G.M.4
  • 5
    • 33745191393 scopus 로고    scopus 로고
    • Digital evidence overload: Scalability and automation
    • Breakout sessions Aug. 17-18, New Orleans, LA
    • Digital Evidence Overload: Scalability and Automation. Breakout sessions at The 5th Annual Digital Forensic Research Workshop (Aug. 17-18, 2005, New Orleans, LA).
    • (2005) The 5th Annual Digital Forensic Research Workshop
  • 6
    • 19944384890 scopus 로고    scopus 로고
    • Risk sensitive digital evidence collection
    • June
    • Kenneally, E. and Brown, C. Risk sensitive digital evidence collection. Digital Investigation 2, 2 (June 2005).
    • (2005) Digital Investigation , vol.2 , pp. 2
    • Kenneally, E.1    Brown, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.