-
4
-
-
3142612259
-
Evidence dynamics: Locard's exchange principle and crime reconstruction
-
W. Chisum and B. Turvey. Evidence dynamics: Locard's exchange principle and crime reconstruction. Journal of Behavioral Profiling, 1, 2000.
-
(2000)
Journal of Behavioral Profiling
, vol.1
-
-
Chisum, W.1
Turvey, B.2
-
5
-
-
52249119337
-
-
Software available at
-
K. Kendall and J. Kornblum. Foremost, 2001. Software available at: http://foremost.sourceforge.net/.
-
(2001)
Foremost
-
-
Kendall, K.1
Kornblum, J.2
-
6
-
-
33847398384
-
Using every part of the buffalo in windows memory analysis
-
J. Kornblum. Using every part of the buffalo in windows memory analysis. Digital Investigation, 4:24-29, 2007.
-
(2007)
Digital Investigation
, vol.4
, pp. 24-29
-
-
Kornblum, J.1
-
7
-
-
33847209935
-
Digital evidence collection process in integrity and memory information gathering
-
Proc. IEEE
-
S. Lee, H. Kim, S. Lee, and J. Lim. Digital evidence collection process in integrity and memory information gathering. In Proceedings of Systematic Approaches to Digital Forensic Engineering, First International Work-shop, Proc. IEEE, pages 236-247, 2005.
-
(2005)
Proceedings of Systematic Approaches to Digital Forensic Engineering, First International Work-shop
, pp. 236-247
-
-
Lee, S.1
Kim, H.2
Lee, S.3
Lim, J.4
-
9
-
-
0024771302
-
Memory coherence in shared virtual memory system
-
Proc. ACM
-
K. Li and P. Hudak. Memory coherence in shared virtual memory system. In Transaction on Computer System, Proc. ACM, pages 321-359, 1989.
-
(1989)
Transaction on Computer System
, pp. 321-359
-
-
Li, K.1
Hudak, P.2
-
10
-
-
52249097334
-
-
Microsoft. User Mode Process Dumper Version 8.1, 2007. Software available at
-
Microsoft. User Mode Process Dumper Version 8.1, 2007. Software available at: http://support.microsoft. com/kb/241215.
-
-
-
-
11
-
-
33751342034
-
Fatkit: A framework for the extraction and analysis of digital forensic data from volatile system memory
-
N. Petroni, A. Walters, T. Fraser, and W. Arbaugh. Fatkit: A framework for the extraction and analysis of digital forensic data from volatile system memory. Digital Investigation, 3:197-210, 2006.
-
(2006)
Digital Investigation
, vol.3
, pp. 197-210
-
-
Petroni, N.1
Walters, A.2
Fraser, T.3
Arbaugh, W.4
-
12
-
-
44949101022
-
Formal forensic investigation eluding disk-based anti-forensic attacks
-
S. Verlag, editor, Workshop on Information Security Applications
-
S. Rekhis and N. Boudriga. Formal forensic investigation eluding disk-based anti-forensic attacks. In S. Verlag, editor, Workshop on Information Security Applications, LNCS Series, 2005.
-
(2005)
LNCS Series
-
-
Rekhis, S.1
Boudriga, N.2
-
14
-
-
77952255373
-
Beyond The CPU: Defeating Hardware Based RAM Acquisition Tools (Part I: AMD case)
-
DC
-
J. Rutkowska. Beyond The CPU: Defeating Hardware Based RAM Acquisition Tools (Part I: AMD case). Black Hat Conference DC, 2007.
-
(2007)
Black Hat Conference
-
-
Rutkowska, J.1
|