-
1
-
-
0348155988
-
Forensic Computing
-
LNCS 2904, Springer
-
Li, X. & Seberry, J., "Forensic Computing", Proceedings of INDOCRYPT, New Delhi, India, 8-10 Dec 2003, LNCS 2904, Springer, 2003, pp.18-35.
-
(2003)
Proceedings of INDOCRYPT, New Delhi, India, 8-10 Dec 2003
, pp. 18-35
-
-
Li, X.1
Seberry, J.2
-
2
-
-
0038205937
-
The role of criminal profiling in the computer forensics process
-
Rogers, M. "The role of criminal profiling in the computer forensics process", Computers and Security, Vol.22, No.4, 2003, pp 292-298.
-
(2003)
Computers and Security
, vol.22
, Issue.4
, pp. 292-298
-
-
Rogers, M.1
-
3
-
-
0032305346
-
Employee abuses in cyberspace: Management's legal quagmire
-
Bequai, A. "Employee abuses in cyberspace: management's legal quagmire", Computers and Security, Vol.17, 1998, pp 667-670.
-
(1998)
Computers and Security
, vol.17
, pp. 667-670
-
-
Bequai, A.1
-
4
-
-
84979838066
-
Monitoring Internet and email usage - Germany: Surfing into unemployment? Private Internet use and emailing under German labour law
-
DOI 10.1016/S0267-3649(02)03011-X, PII S026736490203011X
-
Niemann, J. "Email abuse - Germany: Surfing into unemployment? Private Internet use and emailing under German labour law", Computer Law and Security Report, Vol.18, No.2, 2002, pp 114-116. (Pubitemid 34249785)
-
(2002)
Computer Law and Security Report
, vol.18
, Issue.2
, pp. 114-116
-
-
Niemann, J.-M.1
-
5
-
-
67650173229
-
-
accessed
-
Access Data, FTK Forensic Tool Kit, http://www.accessdata.com accessed 2008.
-
(2008)
FTK Forensic Tool Kit
-
-
-
6
-
-
67650123450
-
-
accessed
-
Guidance Software, Encase, http://www.guidancesoftware.com, accessed 2008.
-
(2008)
Encase
-
-
-
7
-
-
67650106772
-
Who sent the e-mail?
-
Corberan, A., Martinez, R., Montes, F., Roca, S. "Who sent the e-mail?", Law Probability and Risk, Vol.2, No.1, 2003, pp 61-67.
-
(2003)
Law Probability and Risk
, vol.2
, Issue.1
, pp. 61-67
-
-
Corberan, A.1
Martinez, R.2
Montes, F.3
Roca, S.4
-
8
-
-
32344432810
-
Discovery and regeneration of hidden emails
-
DOI 10.1145/1066677.1066792, Applied Computing 2005 - Proceedings of the 20th Annual ACM Symposium on Applied Computing
-
Carenini, G., Ng, R., Zhou, X. & Zwart, E., "Discovery and Regeneration of Hidden Emails", ACM Symposium on Applied Computing, 2005, pp. 503-510. (Pubitemid 43302940)
-
(2005)
Proceedings of the ACM Symposium on Applied Computing
, vol.1
, pp. 503-510
-
-
Carenini, G.1
Ng, R.2
Zhou, X.3
Zwart, E.4
-
9
-
-
4344706333
-
Honeypot Forensics Part I: Analyzing the Network
-
Raynal, F., Berthier, Y., Biondi, P., Kaminsky, D. "Honeypot Forensics Part I: Analyzing the Network", IEEE Security and Privacy, Vol.2, No.4, 2004, pp. 72- 78.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.4
, pp. 72-78
-
-
Raynal, F.1
Berthier, Y.2
Biondi, P.3
Kaminsky, D.4
-
10
-
-
0036870198
-
Network Forensics Analysis
-
Nov-Dec
-
Corey, V., Peterman, C., Shearin, S., Greenberg, M.S. & van Bokkelen, J., "Network Forensics Analysis", IEEE Internet Computing, Nov-Dec, 2002, pp. 60-66.
-
(2002)
IEEE Internet Computing
, pp. 60-66
-
-
Corey, V.1
Peterman, C.2
Shearin, S.3
Greenberg, M.S.4
Van Bokkelen, J.5
-
11
-
-
1942425715
-
-
Artech House, MA, USA
-
Mohay, G., Anderson, A., Collie, B., De Vel, O. & McKemmish, R., Computer and Intrusion Forensics, Artech House, MA, USA, 2003.
-
(2003)
Computer and Intrusion Forensics
-
-
Mohay, G.1
Anderson, A.2
Collie, B.3
De Vel, O.4
McKemmish, R.5
-
12
-
-
67650136969
-
-
accessed
-
Kalamaras, D.B., SocNetV, http://socnetv.sourceforge.net/, accessed 2008.
-
(2008)
-
-
Kalamaras, D.B.1
|