-
1
-
-
70149123367
-
Spy vs. Spy
-
Retrieved 25 August 2008 from
-
Adee Sally. Spy vs. Spy. IEEE Spectrum Online, August 2008, Retrieved 25 August 2008 from http://www.spectrum.ieee.org/aug08/6593.
-
(2008)
IEEE Spectrum Online, August
-
-
Sally, A.1
-
4
-
-
84947196743
-
Defeating encrypted and deniable file systems: TrueCrypt v5.1a and the case of the tattling OS and applications
-
San Jose, CA; July 29, 2008. Available at
-
Czeskis Alexei, St. Hilaire David J, Koscher Karl, Gribble Steven D, Kohno Tadayoshi, Schneier Bruce. Defeating encrypted and deniable file systems: TrueCrypt v5.1a and the case of the tattling OS and applications. 3rd USENIX workshop on hot topics in security (HOTSEC'08), San Jose, CA; July 29, 2008. Available at: http://www.usenix.org/event/hotsec08/tech/full_papers/czeskis/czeskis.pdf.
-
3rd USENIX workshop on hot topics in security (HOTSEC'08)
-
-
Alexei, C.1
St2
Hilaire David, J.3
Karl, K.4
Gribble Steven, D.5
Tadayoshi, K.6
Bruce, S.7
-
5
-
-
77955345007
-
Forensic analysis of the windows registry in memory
-
Baltimore, MD; August
-
Dolan-Gavitt Brendan. Forensic analysis of the windows registry in memory. In: Proceedings of the 8th annual DFRWS conference. Baltimore, MD; August 2008. p. S26-32.
-
(2008)
Proceedings of the 8th annual DFRWS conference
-
-
Brendan, D.-G.1
-
7
-
-
84905605794
-
Link between child porn and Muslim terrorists discovered in police raids
-
retrieved January 11, 2009, http://www.timesonline.co.uk/tol/news/uk/crime/article4959002.ece
-
Kerbaj R., and Kennedy D. Link between child porn and Muslim terrorists discovered in police raids. The Times (October 17, 2008). http://www.timesonline.co.uk/tol/news/uk/crime/article4959002.ece retrieved January 11, 2009, http://www.timesonline.co.uk/tol/news/uk/crime/article4959002.ece
-
(2008)
The Times
-
-
Kerbaj, R.1
Kennedy, D.2
-
9
-
-
70149119363
-
-
Retrieved 8 August 2008, from http://nixbit.com/cat//security/jphs/
-
Latham A. Hide and seek for Linux (2006). http://nixbit.com/cat//security/jphs Retrieved 8 August 2008, from http://nixbit.com/cat//security/jphs/
-
(2006)
Hide and seek for Linux
-
-
Latham, A.1
-
10
-
-
84867694163
-
Recovering deleted data from the windows registry
-
Baltimore, MD; August
-
Morgan Timothy. Recovering deleted data from the windows registry. In: Proceedings of the 8th annual DFRWS conference. Baltimore, MD; August 2008. p. S33-42.
-
(2008)
Proceedings of the 8th annual DFRWS conference
-
-
Timothy, M.1
-
15
-
-
70149083166
-
-
SARC, Steganography Analysis and Research Center
-
SARC - Steganography Analysis and Research Center. http://www.sarc-wv.com/news.aspx.
-
-
-
-
21
-
-
70149092889
-
-
WetStone Technologies, Inc
-
WetStone Technologies, Inc. Stego Suite. https://www.wetstonetech.com/cgi/shop.cgi?view, vol. 1; 2008a.
-
(2008)
Stego Suite
, vol.1
-
-
-
22
-
-
70149094248
-
-
WetStone Technologies, Inc
-
WetStone Technologies, Inc. Gargoyle Investigator. https://www.wetstonetech.com/cgi/shop.cgi?view, vol. 2; 2008b.
-
(2008)
Gargoyle Investigator
, vol.2
-
-
-
23
-
-
70149084276
-
-
Wowarea. Steganography (2006). http://www.wowarea.com/english/help/stega.htm
-
(2006)
Steganography
-
-
Wowarea1
|