-
2
-
-
0038205937
-
The role of criminal profiling in the computer forensics process
-
Rogers M. The role of criminal profiling in the computer forensics process. Comput Secur 2003;22(4):292-8.
-
(2003)
Comput Secur
, vol.22
, Issue.4
, pp. 292-298
-
-
Rogers, M.1
-
3
-
-
0038027865
-
Computer forensics: incident response essentials
-
New York, NY: Addison-Wesley Professional
-
Kruse WJ, Heiser JG. Computer forensics: incident response essentials. New York, NY: Addison-Wesley Professional, 2002.
-
(2002)
-
-
Kruse, W.J.1
Heiser, J.G.2
-
4
-
-
0036756440
-
End-to-end digital forensics
-
Stephenson P. End-to-end digital forensics. Computer Fraud and Security 2002;2002(9):17-9.
-
(2002)
Computer Fraud and Security
, vol.2002
, Issue.9
, pp. 17-19
-
-
Stephenson, P.1
-
5
-
-
84892804004
-
Managing information systems security and privacy
-
Heidelberg/New York: Springer
-
Trček D. Managing information systems security and privacy. Heidelberg/New York: Springer, 2006.
-
(2006)
-
-
Trček, D.1
-
6
-
-
33751404666
-
Measures of retaining digital evidence to prosecute computer-based cyber-crimes
-
Wang SJ. Measures of retaining digital evidence to prosecute computer-based cyber-crimes. Computer Standards & Interfaces 2007;29(2):216-23.
-
(2007)
Computer Standards & Interfaces
, vol.29
, Issue.2
, pp. 216-223
-
-
Wang, S.J.1
-
7
-
-
78149314410
-
-
Palmer G, editor. A, road map for digital forensic research, Report From the First Digital Forensic Research Workshop (DFRWS)). Utica, NY: AFRL/IFGB; 2001 Nov. Report No.: DTR-T001-01 FINAL.
-
Palmer G, editor. A road map for digital forensic research (Report From the First Digital Forensic Research Workshop (DFRWS)). Utica, NY: AFRL/IFGB; 2001 Nov. Report No.: DTR-T001-01 FINAL.
-
-
-
-
8
-
-
78149312907
-
Forensics: The science of crime-solving series
-
Philadelphia, PA: Ser. Mason Crest Publishers
-
Hunter W. Forensics: The science of crime-solving series. Philadelphia, PA: Ser. Mason Crest Publishers, 2005.
-
(2005)
-
-
Hunter, W.1
-
10
-
-
78149326620
-
Proceedings of the Fifth Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools (CPN '04); 2004 Oct 8-11; Aarhus, Denmark
-
In: Jensen K, editor. Aarhus, Denmark: CPN Group-Department of Computer Science/University of Aarhus
-
Stephenson P. A formal model for information risk analysis using colored petri nets. In: Jensen K, editor. Proceedings of the Fifth Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools (CPN '04); 2004 Oct 8-11; Aarhus, Denmark. Aarhus, Denmark: CPN Group-Department of Computer Science/University of Aarhus, 2004;167-84.
-
(2004)
A formal model for information risk analysis using colored petri nets
, pp. 167-184
-
-
Stephenson, P.1
-
11
-
-
33745981764
-
A cyber forensics ontology: creating a new approach to studying cyber forensics
-
Brinson A, Robinson A, Rogers M. A cyber forensics ontology: creating a new approach to studying cyber forensics. Digit Invest 2006;3(Suppl. 1):37-43.
-
(2006)
Digit Invest
, vol.3
, Issue.SUPPL. 1
, pp. 37-43
-
-
Brinson, A.1
Robinson, A.2
Rogers, M.3
-
12
-
-
33746255206
-
FORZA-Digital forensics investigation framework that incorporate legal issues
-
Ieong RSC. FORZA-Digital forensics investigation framework that incorporate legal issues. Digit Invest 2006;3(Suppl. 1):29-36.
-
(2006)
Digit Invest
, vol.3
, Issue.SUPPL. 1
, pp. 29-36
-
-
Ieong, R.S.C.1
-
13
-
-
51149091325
-
A theoretical framework for organizational network forensic readiness
-
Endicott-Popovsky B, Frincke DA, Taylor CA. A theoretical framework for organizational network forensic readiness. J Comput 2007;2(3):1-11.
-
(2007)
J Comput
, vol.2
, Issue.3
, pp. 1-11
-
-
Endicott-Popovsky, B.1
Frincke, D.A.2
Taylor, C.A.3
-
15
-
-
36248946132
-
New approaches for security, privacy and trust in complex environments (IFIP International Federation for Information Processing)
-
In: Venter H, Eloff M, Labuschagne L, Eloff VSR, editors. Boston, MA: Springer
-
Grobler T, Louwrens B. Digital forensic readiness as a component of information security: best practice. In: Venter H, Eloff M, Labuschagne L, Eloff VSR, editors. New approaches for security, privacy and trust in complex environments (IFIP International Federation for Information Processing). Boston, MA: Springer, 2007;13-24.
-
(2007)
Digital forensic readiness as a component of information security: best practice
, pp. 13-24
-
-
Grobler, T.1
Louwrens, B.2
-
16
-
-
51149113181
-
Legal aspects of digital forensics
-
Washington, DC: The George Washington University
-
Ryan DJ, Shpantzer G. Legal aspects of digital forensics. Washington, DC: The George Washington University, 2002.
-
(2002)
-
-
Ryan, D.J.1
Shpantzer, G.2
-
17
-
-
34548120271
-
-
An ad hoc review of digital forensic models. Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2007); 2007 Apr 10-12; Seattle, WA. Washington, DC: IEEE Computer Society
-
Pollitt MM. An ad hoc review of digital forensic models. Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2007); 2007 Apr 10-12; Seattle, WA. Washington, DC: IEEE Computer Society, 2007;10-2.
-
(2007)
, pp. 10-12
-
-
Pollitt, M.M.1
-
18
-
-
50849093942
-
SADFE 2008. Proceedings of the 2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering
-
In: Rekhis S, Krichene J, Boudriga N, editors. ; 2008 May; Oakland, CA. Washington, DC: IEEE Computer Society
-
Rekhis S, Krichene J, Boudriga N. Cognitive-maps based investigation of digital security incidents. In: Rekhis S, Krichene J, Boudriga N, editors. SADFE 2008. Proceedings of the 2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering; 2008 May; Oakland, CA. Washington, DC: IEEE Computer Society, 2008;25-40.
-
(2008)
Cognitive-maps based investigation of digital security incidents
, pp. 25-40
-
-
Rekhis, S.1
Krichene, J.2
Boudriga, N.3
-
19
-
-
77952270535
-
Reconstructing system state for intrusion analysis
-
Goel A, Farhadi K, Po K, Feng W. Reconstructing system state for intrusion analysis. ACM SIGOPS Operating Systems Review 2008;42(3):21-8.
-
(2008)
ACM SIGOPS Operating Systems Review
, vol.42
, Issue.3
, pp. 21-28
-
-
Goel, A.1
Farhadi, K.2
Po, K.3
Feng, W.4
-
20
-
-
78149356870
-
Digital forensics
-
Cohen F. Digital forensics. Network Sec 2000;2000(1):18-20.
-
(2000)
Network Sec
, vol.2000
, Issue.1
, pp. 18-20
-
-
Cohen, F.1
-
21
-
-
33746009068
-
A correlation method for establishing provenance of timestamps in digital evidence
-
Schatz B, Mohay G, Clark A. A correlation method for establishing provenance of timestamps in digital evidence. Digit Invest 2006;3(Suppl. 1):98-107.
-
(2006)
Digit Invest
, vol.3
, Issue.SUPPL. 1
, pp. 98-107
-
-
Schatz, B.1
Mohay, G.2
Clark, A.3
-
22
-
-
84881148080
-
-
Timestamp evidence correlation by model based clock hypothesis testing. Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop; 2008 Jan 21-23; Adelaide, Australia. Brussels, Belgium: ICST, Article No 15.
-
Willassen SY. Timestamp evidence correlation by model based clock hypothesis testing. Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop; 2008 Jan 21-23; Adelaide, Australia. Brussels, Belgium: ICST, 2008;Article No 15.
-
(2008)
-
-
Willassen, S.Y.1
-
23
-
-
48749115314
-
FACE: Automated digital evidence discovery and correlation
-
Case A, Cristina A, Marziale L, Richard GG, Roussev V. FACE: Automated digital evidence discovery and correlation. Digit Invest 2008;5(Suppl. 1):S65-75.
-
(2008)
Digit Invest
, vol.5
, Issue.SUPPL. 1
-
-
Case, A.1
Cristina, A.2
Marziale, L.3
Richard, G.G.4
Roussev, V.5
-
24
-
-
77955414848
-
Covert channel forensics on the internet: issues, approaches, and experiences
-
Patel A, Shah M, Chandramouli R, Subbalakshmi KP. Covert channel forensics on the internet: issues, approaches, and experiences. International Journal of Network Security 2007;5(1):41-50.
-
(2007)
International Journal of Network Security
, vol.5
, Issue.1
, pp. 41-50
-
-
Patel, A.1
Shah, M.2
Chandramouli, R.3
Subbalakshmi, K.P.4
-
25
-
-
34447620631
-
An efficient technique for enhancing forensic capabilities of Ext2 file system
-
Barik MS, Gupta G, Sinha S, Mishra A, Mazumdar C. An efficient technique for enhancing forensic capabilities of Ext2 file system. Digit Invest 2007;4(Suppl. 1):55-61.
-
(2007)
Digit Invest
, vol.4
, Issue.SUPPL. 1
, pp. 55-61
-
-
Barik, M.S.1
Gupta, G.2
Sinha, S.3
Mishra, A.4
Mazumdar, C.5
-
26
-
-
40749152296
-
Probabilistic packet marking for large-scale IP traceback
-
Goodrich MT. Probabilistic packet marking for large-scale IP traceback. IEEE/ACM Transactions on Networking (TON) 2008;16(1):15-24.
-
(2008)
IEEE/ACM Transactions on Networking (TON)
, vol.16
, Issue.1
, pp. 15-24
-
-
Goodrich, M.T.1
-
27
-
-
57949093224
-
Large-scale IP traceback in high-speed internet: practical techniques and information-theoretic foundation
-
Sung M, Xu J, Li J, Li L. Large-scale IP traceback in high-speed internet: practical techniques and information-theoretic foundation. IEEE/ACM Transactions on Networking (TON) 2008;16(6):1253-66.
-
(2008)
IEEE/ACM Transactions on Networking (TON)
, vol.16
, Issue.6
, pp. 1253-1266
-
-
Sung, M.1
Xu, J.2
Li, J.3
Li, L.4
-
28
-
-
77952377075
-
-
A general model of probabilistic packet marking for IP traceback. Proceedings of the 2008 of the ASIAN ACM Symposium on Information, Computer and Communications Security; 2008 Mar 18-20; Tokyo, Japan. New York, NY: ACM
-
Lu L, Chan MC, Chang EC. A general model of probabilistic packet marking for IP traceback. Proceedings of the 2008 of the ASIAN ACM Symposium on Information, Computer and Communications Security; 2008 Mar 18-20; Tokyo, Japan. New York, NY: ACM;179-88.
-
-
-
Lu, L.1
Chan, M.C.2
Chang, E.C.3
-
29
-
-
42049090373
-
Packet forwarding with source verification
-
Shue CA, Gupta M, Davy MP. Packet forwarding with source verification. Computer Networks 2008;52(8):1567-82.
-
(2008)
Computer Networks
, vol.52
, Issue.8
, pp. 1567-1582
-
-
Shue, C.A.1
Gupta, M.2
Davy, M.P.3
-
30
-
-
84969877105
-
-
Conducting forensic investigations of cyber attacks on automobile in-vehicle networks. Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop; 2008 Jan 21-23; Adelaide, Australia. Brussels, Belgium: ICST, Article No 8.
-
Nilsson DK, Larson UE. Conducting forensic investigations of cyber attacks on automobile in-vehicle networks. Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop; 2008 Jan 21-23; Adelaide, Australia. Brussels, Belgium: ICST 2008;Article No 8.
-
(2008)
-
-
Nilsson, D.K.1
Larson, U.E.2
-
31
-
-
78149351642
-
-
Forensic readiness. Cambridge, MA: @stake Inc., accessed August 13, 2009).
-
Tan J. Forensic readiness. Cambridge, MA: @stake Inc., 2001, (accessed August 13, 2009).
-
(2001)
-
-
Tan, J.1
-
32
-
-
24344496999
-
A ten step process for forensic readiness
-
Rowlingson R. A ten step process for forensic readiness. Int J Digit Evid 2004;2(3):1-28.
-
(2004)
Int J Digit Evid
, vol.2
, Issue.3
, pp. 1-28
-
-
Rowlingson, R.1
-
33
-
-
78149320387
-
-
Policies to enhance computer and network forensics. Proceedings of the 2001 IEEE Workshop on Information Assurance and Security; 2001 June 5-6; West Point, NY. IEEE
-
Yasinsac A, Manzano Y. Policies to enhance computer and network forensics. Proceedings of the 2001 IEEE Workshop on Information Assurance and Security; 2001 June 5-6; West Point, NY. IEEE, 2001.
-
(2001)
-
-
Yasinsac, A.1
Manzano, Y.2
-
34
-
-
1942505732
-
Management strategies for implementing forensic security measure
-
Wolfe-Wilson J, Wolfe HB. Management strategies for implementing forensic security measure. Info Tech Sec Report 2003;8(2):55-64.
-
(2003)
Info Tech Sec Report
, vol.8
, Issue.2
, pp. 55-64
-
-
Wolfe-Wilson, J.1
Wolfe, H.B.2
-
35
-
-
1242286401
-
The future of computer forensics: a needs analysis survey
-
Rogers MK, Seigfried K. The future of computer forensics: a needs analysis survey. Comput & Secur 2004;23(1):12-6.
-
(2004)
Comput & Secur
, vol.23
, Issue.1
, pp. 12-16
-
-
Rogers, M.K.1
Seigfried, K.2
-
36
-
-
3042642695
-
Getting physical with the digital investigation process
-
Carrier B, Spafford E. Getting physical with the digital investigation process. Int J Digit Evid 2003;2(2):???-???.
-
(2003)
Int J Digit Evid
, vol.2
, Issue.2
-
-
Carrier, B.1
Spafford, E.2
-
37
-
-
3042745245
-
Computer forensics education
-
Yasinsac A, Erbacher RF, Marks DG, Pollitt MM, Sommer PM. Computer forensics education. IEEE Sec & Priv 2003;1(4):15-23.
-
(2003)
IEEE Sec & Priv
, vol.1
, Issue.4
, pp. 15-23
-
-
Yasinsac, A.1
Erbacher, R.F.2
Marks, D.G.3
Pollitt, M.M.4
Sommer, P.M.5
-
38
-
-
0347577437
-
Security architecture for open distributed systems (Wiley Series in Communications & Distributed Systems)
-
Chichester, England: John Wiley & Sons
-
Muftic S, Patel A, Sanders P, Colon R, Heijnsdijk J, Pulkkinen U. Security architecture for open distributed systems (Wiley Series in Communications & Distributed Systems). Chichester, England: John Wiley & Sons, 1993.
-
(1993)
-
-
Muftic, S.1
Patel, A.2
Sanders, P.3
Colon, R.4
Heijnsdijk, J.5
Pulkkinen, U.6
-
39
-
-
56849106276
-
Computer forensics: high-tech law enforcement
-
Garber L. Computer forensics: high-tech law enforcement. IEEE Computer 2001;34(1):22-7.
-
(2001)
IEEE Computer
, vol.34
, Issue.1
, pp. 22-27
-
-
Garber, L.1
-
41
-
-
84988573115
-
-
The design and implementation of tripwire: a file system integrity checker. Proceedings of the 2nd ACM Conference on Computer and Communications Security; 1994 Nov 2-4; Fairfax, VA. New York, NY: ACM, 1994
-
Gene HK, Spafford EH. The design and implementation of tripwire: a file system integrity checker. Proceedings of the 2nd ACM Conference on Computer and Communications Security; 1994 Nov 2-4; Fairfax, VA. New York, NY: ACM 1994;18-29.
-
-
-
Gene, H.K.1
Spafford, E.H.2
-
42
-
-
85090433665
-
-
SNORT-Lightweight intrusion detection system for networks. Proceedings of the 13th USENIX Conference on System Administration; 1999 Nov 7-12; Seattle, WA. Berkeley, CA: USENIX Association
-
Roesch M. SNORT-Lightweight intrusion detection system for networks. Proceedings of the 13th USENIX Conference on System Administration; 1999 Nov 7-12; Seattle, WA. Berkeley, CA: USENIX Association, 1999;229-38.
-
(1999)
, pp. 229-238
-
-
Roesch, M.1
-
43
-
-
78149343689
-
-
Data Protection Directive 95/64/EC. Official Journal of the European Communities L281, European Commission.
-
Data Protection Directive 95/64/EC. Official Journal of the European Communities L281, European Commission. 1995.
-
(1995)
-
-
-
44
-
-
78149322067
-
-
Services deployment methodologies for weak processing devices: an analysis. In: System theory and applications. Proceedings of the 11th WSEAS International Conference on Systems; 2007 Jul 23-25; Agios Nikolaos, Greece. Stevens Point, WI: WSEAS Press
-
Trček D. Services deployment methodologies for weak processing devices: an analysis. In: System theory and applications. Proceedings of the 11th WSEAS International Conference on Systems; 2007 Jul 23-25; Agios Nikolaos, Greece. Stevens Point, WI: WSEAS Press 2007;357-60.
-
(2007)
, pp. 357-360
-
-
Trček, D.1
-
45
-
-
58049127833
-
-
DiCAP: distributed packet capturing architecture for high-speed network links. 33rd Annual IEEE Conference on Local Computer Networks (LCN); 2008 Oct 14-17; Montreal, Canada. IEEE Computer Society
-
Morariu C, Stiller B. DiCAP: distributed packet capturing architecture for high-speed network links. 33rd Annual IEEE Conference on Local Computer Networks (LCN); 2008 Oct 14-17; Montreal, Canada. IEEE Computer Society, 2008;168-75.
-
(2008)
, pp. 168-175
-
-
Morariu, C.1
Stiller, B.2
-
46
-
-
78149332931
-
-
Open Source Forensics: Open Source Tools
-
Open Source Forensics: Open Source Tools.
-
-
-
-
47
-
-
39749098014
-
-
Is the open way a better way? Digital forensics using open source tools. Proceedings of the 40th Hawaii International Conference on System Sciences; 2007 Jan 3-6; Waikola Village, Hawaii. Washington, DC: IEEE Computer Society
-
Manson D, Carlin A, Ramos S, Gyger A, Kaufman M, Treichelt J. Is the open way a better way? Digital forensics using open source tools. Proceedings of the 40th Hawaii International Conference on System Sciences; 2007 Jan 3-6; Waikola Village, Hawaii. Washington, DC: IEEE Computer Society 2007;266b.
-
(2007)
-
-
Manson, D.1
Carlin, A.2
Ramos, S.3
Gyger, A.4
Kaufman, M.5
Treichelt, J.6
-
48
-
-
38549099956
-
Open source digital forensics tools: the legal argument
-
Cambridge, MA: @stake Inc.
-
Carrier B. Open source digital forensics tools: the legal argument. Cambridge, MA: @stake Inc., 2002.
-
(2002)
-
-
Carrier, B.1
-
49
-
-
78149325013
-
The two-edged sword: Legal computer forensics and open source
-
Byfield B. The two-edged sword: Legal computer forensics and open source. News Forge 2005;???:???-???.
-
(2005)
News Forge
-
-
Byfield, B.1
-
50
-
-
78149336862
-
-
Sleuthkit/Autopsy: an open source forensic package. February 15
-
Gyger A. Sleuthkit/Autopsy: an open source forensic package. February 15, 2006.
-
(2006)
-
-
Gyger, A.1
-
52
-
-
48749091043
-
An overall assessment of Mobile Internal Acquisition Tool
-
Distefano A, Me G. An overall assessment of Mobile Internal Acquisition Tool. Digit Invest 2008;5(Suppl. 1):S121-7.
-
(2008)
Digit Invest
, vol.5
, Issue.SUPPL. 1
-
-
Distefano, A.1
Me, G.2
-
53
-
-
84900130540
-
Digital crime and forensic science in cyberspace (N/A)
-
In: Kanellis P, editor. Hershey, PA: Idea Group Publishing
-
Richard GG, Roussev V. Digital forensics tools: the next generation. In: Kanellis P, editor. Digital crime and forensic science in cyberspace (N/A). Hershey, PA: Idea Group Publishing, 2006;76-81.
-
(2006)
Digital forensics tools: the next generation
, pp. 76-81
-
-
Richard, G.G.1
Roussev, V.2
-
54
-
-
78149346759
-
-
Scientific Working Group on Digital Evidence., Best practices for computer forensics, Version 2.1 (July 2006), accessed August 13, 2009).
-
Scientific Working Group on Digital Evidence. Best practices for computer forensics, Version 2.1 (July 2006), (accessed August 13, 2009).
-
-
-
-
55
-
-
78149332219
-
-
ENFSI., Guidelines for best practice in the forensic examination of digital technology, FIT-2005-001, No. 6, accessed August 13, 2009).
-
ENFSI. Guidelines for best practice in the forensic examination of digital technology, FIT-2005-001, No. 6, (accessed August 13, 2009).
-
-
-
-
56
-
-
0003470701
-
General requirements for the competence of testing and calibration laboratories, ISO/IEC 17025
-
ISO/IEC., 2nd edn. Geneva, Switzerland: ISO
-
ISO/IEC. General requirements for the competence of testing and calibration laboratories, ISO/IEC 17025, 2nd edn. Geneva, Switzerland: ISO, 2005.
-
(2005)
-
-
-
57
-
-
0038365269
-
Model law on electronic commerce
-
UNCITRAL., Vienna, Austria: United Nations Commission on International Trade Law (UNCITRAL)
-
UNCITRAL. Model law on electronic commerce. Vienna, Austria: United Nations Commission on International Trade Law (UNCITRAL), 1996.
-
(1996)
-
-
|