-
1
-
-
33745171808
-
An examination into MSN Messenger 7.5 contact identification
-
June
-
Dickson M. An examination into MSN Messenger 7.5 contact identification. Digital Investigation Volume 3, Issue 2, June 2006, Pages 79-83.
-
(2006)
Digital Investigation
, vol.3
, Issue.2
, pp. 79-83
-
-
Dickson, M.1
-
2
-
-
33750369860
-
An examination into Yahoo Messenger 7.0 contact identification
-
September
-
Dickson M. An examination into Yahoo Messenger 7.0 contact identification. Digital Investigation, Volume 3, Issue 3, September 2006, Pages 159-165.
-
(2006)
Digital Investigation
, vol.3
, Issue.3
, pp. 159-165
-
-
Dickson, M.1
-
3
-
-
33751336113
-
An examination into AOL Instant Messenger 5.5 contact identification
-
December
-
Dickson M. An examination into AOL Instant Messenger 5.5 contact identification. Digital Investigation, Volume 3, Issue 4, December 2006, Pages 227-237.
-
(2006)
Digital Investigation
, vol.3
, Issue.4
, pp. 227-237
-
-
Dickson, M.1
-
4
-
-
33847252861
-
An examination into Trillian basic 3.x contact identification
-
March
-
Dickson M. An examination into Trillian basic 3.x contact identification. Digital Investigation, Volume 4, Issue 1, March 2007, Pages 36-45.
-
(2007)
Digital Investigation
, vol.4
, Issue.1
, pp. 36-45
-
-
Dickson, M.1
-
5
-
-
34447338569
-
Forensic artefacts left by Windows Live Messenger 8.0
-
June
-
van Dongen Wouter S. Forensic artefacts left by Windows Live Messenger 8.0. Digital Investigation, Volume 4, Issue 2, June 2007, Pages 73-87.
-
(2007)
Digital Investigation
, vol.4
, Issue.2
, pp. 73-87
-
-
van Dongen, W.S.1
-
6
-
-
40849095638
-
Forensic artefacts left by Pidgin Messenger 2.0
-
September-December
-
Wouter S. van Dongen. Forensic artefacts left by Pidgin Messenger 2.0. Digital Investigation, Volume 4, Issues 3-4, September-December 2007, Pages 138-145.
-
(2007)
Digital Investigation
, vol.4
, Issue.3-4
, pp. 138-145
-
-
van Dongen, W.S.1
-
7
-
-
48749118027
-
Forensic memory analysis: Files mapped in memory
-
September
-
R.B. van Baar, W. Alink, A.R. van Ballegooij. Forensic memory analysis: Files mapped in memory. Digital Investigation, Volume 5, Issues 1-2, September 2008, Pages 34-48.
-
(2008)
Digital Investigation
, vol.5
, Issue.1-2
, pp. 34-48
-
-
van Baar, R.B.1
Alink, W.2
van Ballegooij, A.R.3
-
8
-
-
48949095226
-
The impact of Microsoft Windows pool allocation strategies on memory forensics
-
September
-
Andreas Schuster. The impact of Microsoft Windows pool allocation strategies on memory forensics. Digital Investigation Volume 5, Supplement 1, September 2008, Pages S58-S64.
-
(2008)
Digital Investigation
, vol.5
, Issue.SUPPL. 1
-
-
Schuster, A.1
-
10
-
-
78651524455
-
-
Win32dd - a free kernel land and 100% open -source tool to acquire physical memory
-
Win32dd - a free kernel land and 100% open -source tool to acquire physical memory. http://win32dd.msuiche.net/.
-
-
-
-
11
-
-
78651524849
-
-
Microsoft. Windows feature lets you generate a memory dump file by using the keyboard
-
Microsoft. Windows feature lets you generate a memory dump file by using the keyboard.
-
-
-
-
14
-
-
33847398384
-
Using every part of the buffalo in windows memory analysis
-
Kornblum Jesse D. Using every part of the buffalo in windows memory analysis. Digital Investigation 2007;4:24-9.
-
(2007)
Digital Investigation
, vol.4
, pp. 24-29
-
-
Kornblum, J.D.1
-
15
-
-
33745993901
-
Searching for processes and threads in Microsoft windows memory dumps
-
Schuster Andreas. Searching for processes and threads in Microsoft windows memory dumps. Digital Investigation 2006;3; 10-6
-
(2006)
Digital Investigation
, vol.3
, pp. 10-16
-
-
Andreas, S.1
-
16
-
-
84870791824
-
-
Rich Text Format (RTF), version 1.6
-
Rich Text Format (RTF) Specification, version 1.6 http://msdn.microsoft.com/en-us/library/aa140277.aspx.
-
Specification
-
-
-
17
-
-
68749122104
-
Collecting Sensitive Information from Windows Physical Memory
-
January
-
Qian Zhao, Tianjie Cao. Collecting Sensitive Information from Windows Physical Memory, Journal of Computer, pp. 3-10, Volume 4, Number 1, January 2009.
-
(2009)
Journal of Computer
, vol.4
, Issue.1
, pp. 3-10
-
-
Zhao, Q.1
Cao, T.2
|