메뉴 건너뛰기




Volumn , Issue , 2009, Pages 3-9

Overcast: Forensic discovery in cloud environments

Author keywords

[No Author keywords available]

Indexed keywords

BEST PRACTICE; COMPLEX SYSTEMS; CORE AREA; DISTRIBUTED SYSTEMS; FORENSIC INVESTIGATION; INTERDISCIPLINARY WORK; RESEARCH AGENDA;

EID: 71249110127     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IMF.2009.21     Document Type: Conference Paper
Times cited : (48)

References (11)
  • 4
    • 85063672820 scopus 로고    scopus 로고
    • Detection and Analysis of Connection Chains in Network Forensics,
    • Ph.D. dissertation, Department of Electrical and Computer Engineering, University of Victoria, Victoria, BC, Canada
    • A. Almulhem, "Detection and Analysis of Connection Chains in Network Forensics," Ph.D. dissertation, Department of Electrical and Computer Engineering, University of Victoria, Victoria, BC, Canada, 2007.
    • (2007)
    • Almulhem, A.1
  • 6
    • 60949108379 scopus 로고    scopus 로고
    • Passive Network Forensics: Behavioural Classification of Network Hosts Based on Connection Patterns
    • apr
    • J. McHugh, R. McLeod, and V. Nagaonkar, "Passive Network Forensics: Behavioural Classification of Network Hosts Based on Connection Patterns," Operating Systems Review, vol. 42, no. 3, pp. 99-111, apr 2008.
    • (2008) Operating Systems Review , vol.42 , Issue.3 , pp. 99-111
    • McHugh, J.1    McLeod, R.2    Nagaonkar, V.3
  • 7
    • 3042731401 scopus 로고    scopus 로고
    • A Hardware-Based Memory Acquisition Procedure for Digital Investigation
    • feb
    • B. D. Carrier and J. Grand, "A Hardware-Based Memory Acquisition Procedure for Digital Investigation," Digital Investigation, vol. 1, no. 1, pp. 50-60, feb 2004.
    • (2004) Digital Investigation , vol.1 , Issue.1 , pp. 50-60
    • Carrier, B.D.1    Grand, J.2
  • 8
    • 40849087846 scopus 로고    scopus 로고
    • Persistent Systems Techniques in Forensic Acquisition of Memory
    • jun
    • E. Huebner, D. Bem, F. A. Henskens, and M. Wallis, "Persistent Systems Techniques in Forensic Acquisition of Memory," Digital Investigation, vol. 4, no. 3-4, pp. 129-137, jun 2007.
    • (2007) Digital Investigation , vol.4 , Issue.3-4 , pp. 129-137
    • Huebner, E.1    Bem, D.2    Henskens, F.A.3    Wallis, M.4
  • 9
    • 48949095226 scopus 로고    scopus 로고
    • A. Schuster, The Impact of Microsoft Windows Pool Allocation Strategies on Memory Forensics, Digital Investigation, 5, no. Supplement, pp. S58-S64, sep 2008.
    • A. Schuster, "The Impact of Microsoft Windows Pool Allocation Strategies on Memory Forensics," Digital Investigation, vol. 5, no. Supplement, pp. S58-S64, sep 2008.
  • 10
    • 48749115314 scopus 로고    scopus 로고
    • A. Case, A. Cristina, L. Marziale, G. G. Richard, and V. Roussev, FACE: Automated Digital Evidence Discovery and Correlation, Digital Investigation, 5, no. Supplement, pp. S65-S75, sep 2008.
    • A. Case, A. Cristina, L. Marziale, G. G. Richard, and V. Roussev, "FACE: Automated Digital Evidence Discovery and Correlation," Digital Investigation, vol. 5, no. Supplement, pp. S65-S75, sep 2008.
  • 11
    • 65249097088 scopus 로고    scopus 로고
    • Live Analysis: Progress and Challenges
    • mar
    • B. Hay, M. Bishop, and K. Nance, "Live Analysis: Progress and Challenges," Security & Privacy, vol. 7, no. 2, pp. 30-37, mar 2009.
    • (2009) Security & Privacy , vol.7 , Issue.2 , pp. 30-37
    • Hay, B.1    Bishop, M.2    Nance, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.