메뉴 건너뛰기




Volumn 285, Issue , 2008, Pages 3-15

When is digital evidence forensically sound?

Author keywords

Digital evidence; Forensically sound evidence

Indexed keywords

COMPUTER FORENSICS; ELECTRONIC CRIME COUNTERMEASURES;

EID: 51149096009     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-84927-0_1     Document Type: Article
Times cited : (60)

References (22)
  • 1
    • 51149107723 scopus 로고    scopus 로고
    • Computer Forensics: Past, Present and Future
    • Technical Report, Information Security Research Centre, Queensland University of Technology, Brisbane, Australia
    • A. Anderson, G. Mohay, L. Smith, A. Tickle and I. Wilson, Computer Forensics: Past, Present and Future, Technical Report, Information Security Research Centre, Queensland University of Technology, Brisbane, Australia, 1999.
    • (1999)
    • Anderson, A.1    Mohay, G.2    Smith, L.3    Tickle, A.4    Wilson, I.5
  • 2
    • 51149091326 scopus 로고    scopus 로고
    • Australian Law Reform Commission, ALRC Discussion Paper 69, Sydney, Australia
    • Australian Law Reform Commission, Review of the Uniform Evidence Acts, ALRC Discussion Paper 69, Sydney, Australia (www.austlii.edu.au/au/other/ alrc/publications/dp/69/index.html), 2005.
    • (2005) Review of the Uniform Evidence Acts
  • 3
    • 3042768157 scopus 로고    scopus 로고
    • Defining digital forensic examination and analysis tools using abstraction layers
    • B. Carrier, Defining digital forensic examination and analysis tools using abstraction layers, International Journal of Digital Evidence vol. 1(4), 2003.
    • (2003) International Journal of Digital Evidence , vol.1 , Issue.4
    • Carrier, B.1
  • 4
  • 6
    • 51149096090 scopus 로고    scopus 로고
    • Law enforcement and digital evidence
    • H. Bidgoli Ed, John Wiley, New York, pp
    • P. Craiger, M. Pollitt and J. Swauger, Law enforcement and digital evidence, in Handbook of Information Security, Volume 2, H. Bidgoli (Ed.), John Wiley, New York, pp. 739-777, 2006.
    • (2006) Handbook of Information Security , vol.2 , pp. 739-777
    • Craiger, P.1    Pollitt, M.2    Swauger, J.3
  • 13
    • 33745186968 scopus 로고    scopus 로고
    • National High Tech Crime Unit, Association of Chief Police Officers, London, United Kingdom
    • National High Tech Crime Unit, Good Practice Guide for Computer Based Electronic Evidence, Association of Chief Police Officers, London, United Kingdom (www.acpo.police.uk/asp/policies/Data/ gpg_computer_based_evidence_v3.pdf), 2003.
    • (2003) Good Practice Guide for Computer Based Electronic Evidence
  • 14
    • 71549129669 scopus 로고    scopus 로고
    • National Institute of Forensic Science, Australia
    • National Institute of Forensic Science, Melbourne, Australia (www.nifs.com.au).
    • Melbourne
  • 15
    • 51149121345 scopus 로고    scopus 로고
    • Gaithersburg, Maryland
    • National Institute of Standards and Technology, Gaithersburg, Maryland (www.nist.gov).
  • 16
    • 51149111513 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, Disk Imaging Tool Specification (Version 3.1.6), Gaithersburg, Maryland (www.cftt.nist.gov/ disk imaging.htm), 2001.
    • National Institute of Standards and Technology, Disk Imaging Tool Specification (Version 3.1.6), Gaithersburg, Maryland (www.cftt.nist.gov/ disk imaging.htm), 2001.
  • 17
    • 0004170481 scopus 로고    scopus 로고
    • Oxford University Press, Third Edition, Oxford, United Kingdom
    • Oxford University Press, Compact Oxford English Dictionary (Third Edition), Oxford, United Kingdom, 2005.
    • (2005) Compact Oxford English Dictionary
  • 22
    • 79960207658 scopus 로고    scopus 로고
    • U.S. Department of Justice, Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations, Washington, DC
    • U.S. Department of Justice, Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations, Computer Crime and Intellectual Property Section, Washington, DC (www.usdoj.gov/ criminal/cybercrime/s&smanual2002.htm), 2002.
    • (2002) Computer Crime and Intellectual Property Section


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.