메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1388-1393

Considerations towards a cyber crime profiling system

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATA THEORY; CANNING; DIGITAL ARITHMETIC; QUALITY ASSURANCE;

EID: 49049120354     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2008.107     Document Type: Conference Paper
Times cited : (7)

References (21)
  • 1
    • 49049115219 scopus 로고    scopus 로고
    • Accessed 2007
    • AccessData. FTK, Accessed 2007. http://www.accessdata.com/common/ pagedetail.aspx?PageCode=ftk2test.
  • 3
    • 84979802546 scopus 로고    scopus 로고
    • Cyber Crime-A new breed of criminal? Computer Law & Security Report
    • 222-227, May
    • K. Burden, C. Palmer, B. Lyde, and Gilbert. Cyber Crime-A new breed of criminal? Computer Law & Security Report, 19(3):222-227, May 2003.
    • (2003) , vol.19 , Issue.3
    • Burden, K.1    Palmer, C.2    Lyde, B.3    Gilbert4
  • 5
    • 11144285997 scopus 로고    scopus 로고
    • Proving the Integrity of Digital Evidence with Time
    • Spring
    • C. Hosmer. Proving the Integrity of Digital Evidence with Time. International Journal of Digital Evidence, 1(1), Spring 2002.
    • (2002) International Journal of Digital Evidence , vol.1 , Issue.1
    • Hosmer, C.1
  • 8
    • 0004011439 scopus 로고    scopus 로고
    • Introduction to Languages and the Theory of Computation
    • McGraw-Hill International Editions, Second edition
    • J. C. Martin. Introduction to Languages and the Theory of Computation. Programming Languages Series. McGraw-Hill International Editions, Second edition, 1997.
    • (1997) Programming Languages Series
    • Martin, J.C.1
  • 9
    • 84880395007 scopus 로고    scopus 로고
    • Accessed 2007
    • National Institute of Standards and Technology. National Software Reference Library, Accessed 2007. http://www.nsrl.nist.gov/.
    • National Software Reference Library
  • 10
    • 49049106206 scopus 로고    scopus 로고
    • T. Pathways. ProDiscover Computer Forensics, Accessed 2007. http://www.techpathways.com/prodiscoverdft.htm.
    • T. Pathways. ProDiscover Computer Forensics, Accessed 2007. http://www.techpathways.com/prodiscoverdft.htm.
  • 12
    • 0004292408 scopus 로고
    • DARPA Internet Program Protocol Specification, September
    • J. Postel. Internet Protocol: DARPA Internet Program Protocol Specification, September 1981. http://www.rfc-editor.org/rfc/rfc791.txt.
    • (1981) Internet Protocol
    • Postel, J.1
  • 15
    • 49049092662 scopus 로고    scopus 로고
    • G. Software. Encase Forensic, Accessed 2007. http://www.guidancesoftware. com/products/ef_index.aspx.
    • G. Software. Encase Forensic, Accessed 2007. http://www.guidancesoftware. com/products/ef_index.aspx.
  • 17
    • 84892104868 scopus 로고    scopus 로고
    • Accessed 2007
    • Wikipedia. Finite State Machine, Accessed 2007. http://en.wikipedia.org/ wiki/Finite_state_machine.
    • Finite State Machine
  • 18
    • 49049114611 scopus 로고    scopus 로고
    • Accessed 2007
    • Wikipedia. Gary McKinnon, Accessed 2007. http://en.wikipedia.org/wiki/ Gary_McKinnon.
    • Gary McKinnon
  • 19
    • 0037223962 scopus 로고    scopus 로고
    • The circumstances of seizure
    • February
    • H. B. Wolfe. The circumstances of seizure. Computers & Security, 22(2):96-98, February 2003.
    • (2003) Computers & Security , vol.22 , Issue.2 , pp. 96-98
    • Wolfe, H.B.1
  • 20
    • 0037287457 scopus 로고    scopus 로고
    • Computer forensics
    • January
    • H. B. Wolfe. Computer forensics. Computers & Security, 22(1):26-28, January 2003.
    • (2003) Computers & Security , vol.22 , Issue.1 , pp. 26-28
    • Wolfe, H.B.1
  • 21
    • 0037530619 scopus 로고    scopus 로고
    • Evidence Analysis
    • May
    • H. B. Wolfe. Evidence Analysis. Computers & Security, 22(4):289-291, May 2003.
    • (2003) Computers & Security , vol.22 , Issue.4 , pp. 289-291
    • Wolfe, H.B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.