-
2
-
-
34047215259
-
Counter-forensic privacy tools: A forensic evaluation
-
Institute for Software Research International, Carnegie-Mellon University, Pittsburgh, Pennsylvania (reports-archive.adm.cs.cmu.edu/anon/isri20 05/CMU-ISRI-05-119.pdf)
-
M. Geiger and F. Cranor, Counter-Forensic Privacy Tools: A Forensic Evaluation, Technical Report CMU-ISRI-05-119, Institute for Software Research International, Carnegie-Mellon University, Pittsburgh, Pennsylvania (reports-archive.adm.cs.cmu.edu/anon/isri20 05/CMU-ISRI-05-119.pdf), 2005.
-
(2005)
Technical Report CMU-ISRI-05-119
-
-
Geiger, M.1
Cranor, F.2
-
3
-
-
77954728672
-
Rigorous development of automated inconsistency checks for digital evidence using the B method
-
P. Gladyshev and A. Enbacka, Rigorous development of automated inconsistency checks for digital evidence using the B method, International Journal of Digital Evidence, vol. 6(2), pp. 1-21, 2007.
-
(2007)
International Journal of Digital Evidence
, vol.6
, Issue.2
, pp. 1-21
-
-
Gladyshev, P.1
Enbacka, A.2
-
4
-
-
33745983277
-
Formalizing event time bounding in digital investigations
-
P. Gladyshev and A. Patel, Formalizing event time bounding in digital investigations, International Journal of Digital Evidence, vol. 4(2), pp. 1-14, 2005.
-
(2005)
International Journal of Digital Evidence
, vol.4
, Issue.2
, pp. 1-14
-
-
Gladyshev, P.1
Patel, A.2
-
5
-
-
33847626038
-
Anti-forensics with a small army of exploits
-
S. Hilley, Anti-forensics with a small army of exploits, Digital Investigation, vol. 4(1), pp. 13-15, 2007.
-
(2007)
Digital Investigation
, vol.4
, Issue.1
, pp. 13-15
-
-
Hilley, S.1
-
6
-
-
73549089383
-
-
Microsoft Corporation, Redmond, Washington (support.microsoft.com/kb/ 256986)
-
Microsoft Corporation, Windows registry information for advanced users, Redmond, Washington (support.microsoft.com/kb/256986), 2008.
-
(2008)
Windows Registry Information for Advanced Users
-
-
-
7
-
-
51149114414
-
Hypothesis-based investigation of digital timestamps
-
I. Ray and S. Shenoi (Eds.), Springer, Boston, Massachusetts
-
S. Willassen, Hypothesis-based investigation of digital timestamps, in Advances in Digital Forensics IV, I. Ray and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 75-86, 2008.
-
(2008)
Advances in Digital Forensics
, vol.4
, pp. 75-86
-
-
Willassen, S.1
-
8
-
-
68649113319
-
Using ShellBag information to reconstruct user activities
-
Y. Zhu, P. Gladyshev and J. James, Using ShellBag information to reconstruct user activities, Digital Investigation, vol. 6(S1), pp. S69-S77, 2009.
-
(2009)
Digital Investigation
, vol.6
, Issue.S1
-
-
Zhu, Y.1
Gladyshev, P.2
James, J.3
-
9
-
-
68649109486
-
A comparative methodology for the reconstruction of digital events using Windows restore points
-
Y. Zhu, J. James and P. Gladyshev, A comparative methodology for the reconstruction of digital events using Windows restore points, Digital Investigation, vol. 6(1-2), pp. 8-15, 2009.
-
(2009)
Digital Investigation
, vol.6
, Issue.1-2
, pp. 8-15
-
-
Zhu, Y.1
James, J.2
Gladyshev, P.3
|