메뉴 건너뛰기




Volumn , Issue , 2011, Pages 48-61

Forensics investigations of multimedia data: A review of the state-of-the-art

Author keywords

Content classification; Content forgery; Data recovery approaches for multimedia files; Digital Forensics; Environment classification; Fragment Identification; Multimedia Data; Source identification; State of the Art; Steganography and Steganalysis; Survey

Indexed keywords

CONTENT CLASSIFICATION; CONTENT FORGERY; DATA RECOVERY; DIGITAL FORENSIC; ENVIRONMENT CLASSIFICATION; FRAGMENT IDENTIFICATION; MULTIMEDIA DATA; SOURCE IDENTIFICATION; STATE-OF-THE-ART;

EID: 79960728203     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IMF.2011.14     Document Type: Conference Paper
Times cited : (48)

References (91)
  • 3
    • 46449095467 scopus 로고    scopus 로고
    • A survey on digital camera image forensic methods
    • T. V. Lanh, K.-S. Chong, S. Emmanuel, and M. S. Kankanhalli, "A survey on digital camera image forensic methods," in ICME, 2007, pp. 16-19.
    • (2007) ICME , pp. 16-19
    • Lanh, T.V.1    Chong, K.-S.2    Emmanuel, S.3    Kankanhalli, M.S.4
  • 4
    • 70349303469 scopus 로고    scopus 로고
    • Multimedia forensics is not computer forensics
    • R. Böhme, F. C. Freiling, T. Gloe, and M. Kirchner, "Multimedia forensics is not computer forensics," in IWCF, 2009, pp. 90-103.
    • (2009) IWCF , pp. 90-103
    • Böhme, R.1    Freiling, F.C.2    Gloe, T.3    Kirchner, M.4
  • 7
    • 77952591585 scopus 로고    scopus 로고
    • Source camera identification using enhanced sensor pattern noise
    • -, "Source camera identification using enhanced sensor pattern noise," IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 280-287, 2010.
    • (2010) IEEE Transactions on Information Forensics and Security , vol.5 , Issue.2 , pp. 280-287
    • Li, C.-T.1
  • 9
    • 69749111736 scopus 로고    scopus 로고
    • Intrinsic sensor noise features for forensic analysis on scanners and scanned images
    • September Online. Available
    • H. Gou, A. Swaminathan, and M. Wu, "Intrinsic sensor noise features for forensic analysis on scanners and scanned images," Trans. Info. For. Sec., vol. 4, pp. 476-491, September 2009. [Online]. Available: http://portal.acm.org/citation.cfm?id=1651180.1651198
    • (2009) Trans. Info. For. Sec. , vol.4 , pp. 476-491
    • Gou, H.1    Swaminathan, A.2    Wu, M.3
  • 10
    • 70149088782 scopus 로고    scopus 로고
    • Source video camera identification for multiply compressed videos originating from youtube
    • W. van Houten and Z. Geradts, "Source video camera identification for multiply compressed videos originating from youtube," Digital Investigation, vol. 6, no. 1-2, pp. 48-60, 2009.
    • (2009) Digital Investigation , vol.6 , Issue.1-2 , pp. 48-60
    • Van Houten, W.1    Geradts, Z.2
  • 11
    • 50649103674 scopus 로고    scopus 로고
    • What, where and who? Classifying events by scene and object recognition
    • vol. 0
    • L.-J. Li and L. Fei-Fei, "What, where and who? classifying events by scene and object recognition," Computer Vision, IEEE International Conference on, vol. 0, pp. 1-8, 2007.
    • (2007) Computer Vision, IEEE International Conference on , pp. 1-8
    • Li, L.-J.1    Fei-Fei, L.2
  • 12
    • 77957897252 scopus 로고    scopus 로고
    • Recognizing picture-taking environment from satellite images: A feasibility study
    • J. Luo, W. Hao, D. McIntyre, D. Joshi, and J. Yu, "Recognizing picture-taking environment from satellite images: A feasibility study," in ICPR, 2008, pp. 1-4.
    • (2008) ICPR , pp. 1-4
    • Luo, J.1    Hao, W.2    McIntyre, D.3    Joshi, D.4    Yu, J.5
  • 16
    • 38849151499 scopus 로고    scopus 로고
    • Digital audio forensics: A first practical evaluation on microphone and environment classification
    • New York, NY, USA: Online. Available
    • C. Kraetzer, A. Oermann, J. Dittmann, and A. Lang, "Digital audio forensics: a first practical evaluation on microphone and environment classification," in Proceedings of the 9th workshop on Multimedia & security, ser. MM-Sec '07. New York, NY, USA: ACM, 2007, pp. 63-74. [Online]. Available: http://doi.acm.org/10.1145/1288869.1288879
    • (2007) Proceedings of the 9th Workshop on Multimedia & Security, Ser. MM-Sec '07 , pp. 63-74
    • Kraetzer, C.1    Oermann, A.2    Dittmann, J.3    Lang, A.4
  • 18
    • 77955689262 scopus 로고    scopus 로고
    • Audio authenticity: Detecting enf discontinuity with high precision phase analysis
    • September Online. Available
    • D. P. N. Rodríguez, J. A. Apolinário, and L. W. P. Biscainho, "Audio authenticity: detecting enf discontinuity with high precision phase analysis," Trans. Info. For. Sec., vol. 5, pp. 534-543, September 2010. [Online]. Available: http://dx.doi.org/10.1109/TIFS.2010.2051270
    • (2010) Trans. Info. For. Sec. , vol.5 , pp. 534-543
    • Rodríguez, D.P.N.1    Apolinário, J.A.2    Biscainho, L.W.P.3
  • 20
    • 79960715987 scopus 로고    scopus 로고
    • Name Unknown, February Online; Status 25/08/2010
    • Name Unknown, "Polizei zerschlägt Kinderporno-Ring mit 2360 Verdächtigen," http://www.spiegel.de/panorama/justiz/0,1518,464920,00. html, February 2007, [Online; Status 25/08/2010].
    • (2007) Polizei Zerschlägt Kinderporno-Ring Mit 2360 Verdächtigen
  • 21
    • 72449170537 scopus 로고    scopus 로고
    • Detecting pornographic video content by combining image features with motion information
    • C. Jansohn, A. Ulges, and T. M. Breuel, "Detecting pornographic video content by combining image features with motion information," in ACM Multimedia, 2009, pp. 601-604.
    • (2009) ACM Multimedia , pp. 601-604
    • Jansohn, C.1    Ulges, A.2    Breuel, T.M.3
  • 24
    • 78449271408 scopus 로고    scopus 로고
    • Nudetective: A forensic tool to help combat child pornography through automatic nudity detection
    • M. de Castro Polastro and P. M. da Silva Eleuterio, "Nudetective: A forensic tool to help combat child pornography through automatic nudity detection," in DEXA Workshops, 2010, pp. 349-353.
    • DEXA Workshops, 2010 , pp. 349-353
    • De Castro Polastro, M.1    Da Silva Eleuterio, P.M.2
  • 26
    • 77957951513 scopus 로고    scopus 로고
    • Bag-of-visual-words models for adult image classification and filtering
    • T. Deselaers, L. Pimenidis, and H. Ney, "Bag-of-visual-words models for adult image classification and filtering," in ICPR, 2008, pp. 1-4.
    • (2008) ICPR , pp. 1-4
    • Deselaers, T.1    Pimenidis, L.2    Ney, H.3
  • 29
    • 79960718594 scopus 로고    scopus 로고
    • Detecting copy-move forgery in digital images: A survey and analysis of current methods
    • B. L. Shivakumar, "Detecting copy-move forgery in digital images: A survey and analysis of current methods," Global Journal of Computer Science and Technology, vol. 10, pp. 61-65, 2010.
    • (2010) Global Journal of Computer Science and Technology , vol.10 , pp. 61-65
    • Shivakumar, B.L.1
  • 32
    • 77953650817 scopus 로고    scopus 로고
    • A bibliography on blind methods for identifying image forgery
    • Online. Available
    • B. Mahdian and S. Saic, "A bibliography on blind methods for identifying image forgery," Signal Processing: Image Communication, vol. 25, no. 6, pp. 389-399, 2010. [Online]. Available: http://www.sciencedirect.com/ science/article/B6V08-505N6XX-1/2/da59292ef818716646092b465521f7bc
    • (2010) Signal Processing: Image Communication , vol.25 , Issue.6 , pp. 389-399
    • Mahdian, B.1    Saic, S.2
  • 33
    • 70350536692 scopus 로고    scopus 로고
    • A survey of passive image tampering detection
    • Digital Watermarking, ser. A. Ho, Y. Shi, H. Kim, and M. Barni, Eds. Springer Berlin / Heidelberg
    • W. Wang, J. Dong, and T. Tan, "A survey of passive image tampering detection," in Digital Watermarking, ser. Lecture Notes in Computer Science, A. Ho, Y. Shi, H. Kim, and M. Barni, Eds. Springer Berlin / Heidelberg, 2009, vol. 5703, pp. 308-322.
    • (2009) Lecture Notes in Computer Science , vol.5703 , pp. 308-322
    • Wang, W.1    Dong, J.2    Tan, T.3
  • 35
    • 77950556097 scopus 로고    scopus 로고
    • Overview of audio forensics
    • Intelligent Multimedia Analysis for Security Applications, ser. H. Sencar, S. Velastin, N. Nikolaidis, and S. Lian, Eds. Springer Berlin / Heidelberg
    • R. Maher, "Overview of audio forensics," in Intelligent Multimedia Analysis for Security Applications, ser. Studies in Computational Intelligence, H. Sencar, S. Velastin, N. Nikolaidis, and S. Lian, Eds. Springer Berlin / Heidelberg, 2010, vol. 282, pp. 127-144.
    • (2010) Studies in Computational Intelligence , vol.282 , pp. 127-144
    • Maher, R.1
  • 36
    • 85032751728 scopus 로고    scopus 로고
    • Audio forensic examination: Authenticity, enhancement, and interpretation
    • -, "Audio forensic examination: authenticity, enhancement, and interpretation," in IEEE Signal Processing Magazine, vol. 26, no. 2, 2009, pp. 84-94.
    • (2009) IEEE Signal Processing Magazine , vol.26 , Issue.2 , pp. 84-94
    • Maher, R.1
  • 37
    • 70349826507 scopus 로고    scopus 로고
    • Applications of enf analysis in forensic authentication of digital audio and video recordings
    • C. Grigoras, "Applications of enf analysis in forensic authentication of digital audio and video recordings," Journal of Audio Engineering Society, vol. 57, no. 9, pp. 643-661, 2009.
    • (2009) Journal of Audio Engineering Society , vol.57 , Issue.9 , pp. 643-661
    • Grigoras, C.1
  • 38
    • 0030384775 scopus 로고    scopus 로고
    • Techniques for data hiding
    • September
    • W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding," IBM Syst. J., vol. 35, pp. 313-336, September 1996.
    • (1996) IBM Syst. J. , vol.35 , pp. 313-336
    • Bender, W.1    Gruhl, D.2    Morimoto, N.3    Lu, A.4
  • 39
    • 79960141184 scopus 로고    scopus 로고
    • Ph.D. dissertation, Dartmouth College, Hanover, NH, USA, adviser-Farid, Hany
    • W. Wang, "Digital video forensics," Ph.D. dissertation, Dartmouth College, Hanover, NH, USA, 2009, adviser-Farid, Hany.
    • (2009) Digital Video Forensics
    • Wang, W.1
  • 40
    • 38849195462 scopus 로고    scopus 로고
    • Exposing digital forgeries in video by detecting duplication
    • New York, NY, USA: Online. Available
    • W. Wang and H. Farid, "Exposing digital forgeries in video by detecting duplication," in Proceedings of the 9th workshop on Multimedia & security, ser. MM-Sec '07. New York, NY, USA: ACM, 2007, pp. 35-42. [Online]. Available: http://doi.acm.org/10.1145/1288869.1288876
    • (2007) Proceedings of the 9th Workshop on Multimedia & Security, Ser. MM-Sec '07 , pp. 35-42
    • Wang, W.1    Farid, H.2
  • 41
    • 70449629685 scopus 로고    scopus 로고
    • Exposing digital forgeries in video by detecting double quantization
    • New York, NY, USA: Online. Available
    • -, "Exposing digital forgeries in video by detecting double quantization," in Proceedings of the 11th ACM workshop on Multimedia and security, ser. MM-Sec '09. New York, NY, USA: ACM, 2009, pp. 39-48. [Online]. Available: http://doi.acm.org/10.1145/1597817.1597826
    • (2009) Proceedings of the 11th ACM Workshop on Multimedia and Security, Ser. MM-Sec '09 , pp. 39-48
    • Wang, W.1    Farid, H.2
  • 42
    • 60149105669 scopus 로고    scopus 로고
    • Detecting video forgeries based on noise characteristics
    • Advances in Image and Video Technology, ser. T. Wada, F. Huang, and S. Lin, Eds. Springer Berlin / Heidelberg
    • M. Kobayashi, T. Okabe, and Y. Sato, "Detecting video forgeries based on noise characteristics," in Advances in Image and Video Technology, ser. Lecture Notes in Computer Science, T. Wada, F. Huang, and S. Lin, Eds. Springer Berlin / Heidelberg, 2009, vol. 5414, pp. 306-317.
    • (2009) Lecture Notes in Computer Science , vol.5414 , pp. 306-317
    • Kobayashi, M.1    Okabe, T.2    Sato, Y.3
  • 46
    • 77954698591 scopus 로고    scopus 로고
    • Making sense of unstructured flash-memory dumps
    • D. Billard and R. Hauri, "Making sense of unstructured flash-memory dumps," in SAC, 2010, pp. 1579-1583.
    • (2010) SAC , pp. 1579-1583
    • Billard, D.1    Hauri, R.2
  • 48
    • 77955400664 scopus 로고    scopus 로고
    • Scalpel: A frugal, high performance file carver
    • G. G. R. III and V. Roussev, "Scalpel: A frugal, high performance file carver," in DFRWS, 2005.
    • (2005) DFRWS
    • R III, G.G.1    Roussev, V.2
  • 50
    • 84870667487 scopus 로고    scopus 로고
    • Online; Status 22/10/2010
    • "Fuse: Filesystem in userspace," http://fuse.sourceforge.net, [Online; Status 22/10/2010].
    • Fuse: Filesystem in Userspace
  • 51
    • 34447513980 scopus 로고    scopus 로고
    • Carving contiguous and fragmented files with fast object validation
    • Online. Available
    • S. L. Garfinkel, "Carving contiguous and fragmented files with fast object validation," Digital Investigation, vol. 4, no. Supplement 1, pp. 2-12, 2007. [Online]. Available: http://www.sciencedirect.com/science/article/ B7CW4-4P06CJD-1/2/48c9cdedb7d3e76b5880b58c871110be
    • (2007) Digital Investigation , vol.4 , Issue.SUPPL. 1 , pp. 2-12
    • Garfinkel, S.L.1
  • 52
    • 48749129422 scopus 로고    scopus 로고
    • Detecting file fragmentation point using sequential hypothesis testing
    • the Proceedings of the Eighth Annual DFRWS Conference. [Online]. Available
    • A. Pal, H. T. Sencar, and N. Memon, "Detecting file fragmentation point using sequential hypothesis testing," Digital Investigation, vol. 5, no. Supplement 1, pp. S2-S13, 2008, the Proceedings of the Eighth Annual DFRWS Conference. [Online]. Available: http://www.sciencedirect.com/science/article/ B7CW4-4T5SYCF-3/2/3ce3ceeea25479675b0156d1cfc5ae6b
    • (2008) Digital Investigation , vol.5 , Issue.SUPPL. 1
    • Pal, A.1    Sencar, H.T.2    Memon, N.3
  • 53
    • 31144464783 scopus 로고    scopus 로고
    • Automated reassembly of file fragmented images using greedy algorithms
    • A. Pal and N. D. Memon, "Automated reassembly of file fragmented images using greedy algorithms," IEEE Transactions on Image Processing, vol. 15, no. 2, pp. 385-393, 2006.
    • (2006) IEEE Transactions on Image Processing , vol.15 , Issue.2 , pp. 385-393
    • Pal, A.1    Memon, N.D.2
  • 54
    • 84944746002 scopus 로고    scopus 로고
    • Automatic reassembly of document fragments via context based statistical models
    • 2003
    • K. Shanmugasundaram and N. Memon, "Automatic reassembly of document fragments via context based statistical models," in Context Based Statistical Models ACSAC, 2003, 2003, pp. 152-159.
    • (2003) Context Based Statistical Models ACSAC , pp. 152-159
    • Shanmugasundaram, K.1    Memon, N.2
  • 57
    • 78650688275 scopus 로고    scopus 로고
    • Fragmentation point detection of jpeg images at dht using validator
    • Future Generation Information Technology, ser. Y.-h. Lee, T.-h. Kim, W.-c. Fang, and D. Slezak, Eds. Springer Berlin / Heidelberg
    • K. Mohamad and M. Deris, "Fragmentation point detection of jpeg images at dht using validator," in Future Generation Information Technology, ser. Lecture Notes in Computer Science, Y.-h. Lee, T.-h. Kim, W.-c. Fang, and D. Slezak, Eds. Springer Berlin / Heidelberg, 2009, vol. 5899, pp. 173-180.
    • (2009) Lecture Notes in Computer Science , vol.5899 , pp. 173-180
    • Mohamad, K.1    Deris, M.2
  • 58
    • 68649121876 scopus 로고    scopus 로고
    • Identification and recovery of jpeg files with missing fragments
    • the Proceedings of the Ninth Annual DFRWS Conference. [Online]. Available
    • H. T. Sencar and N. Memon, "Identification and recovery of jpeg files with missing fragments," Digital Investigation, vol. 6, no. Supplement 1, pp. S88-S98, 2009, the Proceedings of the Ninth Annual DFRWS Conference. [Online]. Available: http://www.sciencedirect.com/science/article/ B7CW4-4X1HY5C-D/2/7b6b8f0c39bb4f301335cb3a5e6ca946
    • (2009) Digital Investigation , vol.6 , Issue.SUPPL. 1
    • Sencar, H.T.1    Memon, N.2
  • 59
    • 79960730123 scopus 로고    scopus 로고
    • Online. Available
    • Automated reassembly of fragmented images, vol. 1, 2003. [Online]. Available: http://isis.poly.edu/kulesh/research/pubs/icassp- 2003.pdf
    • (2003) Automated Reassembly of Fragmented Images , vol.1
  • 60
    • 79960717181 scopus 로고    scopus 로고
    • Online; Status 22/10/2010
    • "Adroit photo forensics 2010," http://digital-assembly.com, [Online; Status 22/10/2010].
    • Adroit Photo Forensics 2010
  • 63
    • 77955404469 scopus 로고    scopus 로고
    • Using purpose-built functions and block hashes to enable small block and sub-file forensics
    • the Proceedings of the Tenth Annual DFRWS Conference. [Online]. Available
    • S. Garfinkel, A. Nelson, D. White, and V. Roussev, "Using purpose-built functions and block hashes to enable small block and sub-file forensics," Digital Investigation, vol. 7, no. Supplement 1, pp. S13-S23, 2010, the Proceedings of the Tenth Annual DFRWS Conference. [Online]. Available: http://www.sciencedirect.com/science/article/B7CW4-50NX65H-4/2/ 992954f303e13b95b4d06dde70d19cc9
    • (2010) Digital Investigation , vol.7 , Issue.SUPPL. 1
    • Garfinkel, S.1    Nelson, A.2    White, D.3    Roussev, V.4
  • 64
    • 74549153311 scopus 로고    scopus 로고
    • File fragment classification-the case for specialized approaches
    • V. Roussev and S. L. Garfinkel, "File fragment classification-the case for specialized approaches," in SADFE, 2009, pp. 3-14.
    • (2009) SADFE , pp. 3-14
    • Roussev, V.1    Garfinkel, S.L.2
  • 65
    • 77955421242 scopus 로고    scopus 로고
    • Classification of steganalysis techniques: A study
    • A. Nissar and A. Mir, "Classification of steganalysis techniques: A study," Digital Signal Processing, vol. 20, no. 6, pp. 1758-1770, 2010.
    • (2010) Digital Signal Processing , vol.20 , Issue.6 , pp. 1758-1770
    • Nissar, A.1    Mir, A.2
  • 66
    • 70350710022 scopus 로고    scopus 로고
    • Digital image steganography: Survey and analysis of current methods
    • A. Cheddad, J. Condell, K. Curran, and P. M. Kevitt, "Digital image steganography: Survey and analysis of current methods," Signal Processing, vol. 90, no. 3, pp. 727-752, 2010.
    • (2010) Signal Processing , vol.90 , Issue.3 , pp. 727-752
    • Cheddad, A.1    Condell, J.2    Curran, K.3    Kevitt, P.M.4
  • 67
    • 11844252006 scopus 로고    scopus 로고
    • Cyber warfare: Steganography vs. steganalysis
    • October
    • H. Wang and S. Wang, "Cyber warfare: steganography vs. steganalysis," Commun. ACM, vol. 47, pp. 76-82, October 2004.
    • (2004) Commun. ACM , vol.47 , pp. 76-82
    • Wang, H.1    Wang, S.2
  • 70
    • 21244443111 scopus 로고    scopus 로고
    • Current trends in steganalysis: A critical survey
    • R. Chandramouli and K. P. Subbalakshmi, "Current trends in steganalysis: a critical survey," in ICARCV, 2004, pp. 964-967.
    • (2004) ICARCV , pp. 964-967
    • Chandramouli, R.1    Subbalakshmi, K.P.2
  • 74
    • 79960731303 scopus 로고    scopus 로고
    • 03 Ascld (american society of crime lab directors/laboratory). [Online]. Available
    • ASCLD. (2011, 03) Ascld (american society of crime lab directors/laboratory). [Online]. Available: http://www.ascld.org/
    • (2011)
  • 75
    • 79960704995 scopus 로고    scopus 로고
    • Evidential Weight and Legal Admissibility of Information Stored Electronically
    • Online. Available
    • A. Shipman and B. S. Institution, Evidential Weight and Legal Admissibility of Information Stored Electronically. Code of Practice for the Implementation of BS 10008. British Standards Institution, 2008. [Online]. Available: http://shop.bsigroup.com/ProductDetail/?pid=000000000030186227
    • (2008) Code of Practice for the Implementation of BS 10008
    • Shipman, A.1    Institution, B.S.2
  • 77
    • 0003470701 scopus 로고    scopus 로고
    • ISO/IEC 17025:2005 International Organization for Standardization (ISO) / International Electrotechnical Commission (IEC) Std.
    • ISO/IEC 17025:2005 - General requirements for the competence of testing and calibration laboratories, International Organization for Standardization (ISO) / International Electrotechnical Commission (IEC) Std., 2005.
    • (2005) General Requirements for the Competence of Testing and Calibration Laboratories
  • 78
    • 79960736782 scopus 로고    scopus 로고
    • Site Security Handbook
    • Informational, Sep. Online. Available
    • B. Fraser, "Site Security Handbook," RFC 2196 (Informational), Internet Engineering Task Force, Sep. 1997. [Online]. Available: http://www.ietf.org/rfc/rfc2196.txt
    • (1997) RFC , vol.2196
    • Fraser, B.1
  • 79
    • 70450124985 scopus 로고    scopus 로고
    • Expectations for Computer Security Incident Response
    • Best Current Practice, Jun. Online. Available
    • N. Brownlee and E. Guttman, "Expectations for Computer Security Incident Response," RFC 2350 (Best Current Practice), Internet Engineering Task Force, Jun. 1998. [Online]. Available: http://www.ietf.org/rfc/rfc2350.txt
    • (1998) RFC , vol.2350
    • Brownlee, N.1    Guttman, E.2
  • 80
    • 0742292799 scopus 로고    scopus 로고
    • Internet Security Glossary
    • Informational, May obsoleted by RFC 4949. [Online]. Available
    • R. Shirey, "Internet Security Glossary," RFC 2828 (Informational), Internet Engineering Task Force, May 2000, obsoleted by RFC 4949. [Online]. Available: http://www.ietf.org/rfc/rfc2828.txt
    • (2000) RFC , vol.2828
    • Shirey, R.1
  • 81
    • 77950555514 scopus 로고    scopus 로고
    • Guidelines for Evidence Collection and Archiving
    • Best Current Practice, Feb. Online. Available
    • D. Brezinski and T. Killalea, "Guidelines for Evidence Collection and Archiving," RFC 3227 (Best Current Practice), Internet Engineering Task Force, Feb. 2002. [Online]. Available: http://www.ietf.org/rfc/rfc3227.txt
    • (2002) RFC , vol.3227
    • Brezinski, D.1    Killalea, T.2
  • 82
    • 33847204918 scopus 로고    scopus 로고
    • Computer forensics: The need for standardization and certification
    • M. Meyers and M. Rogers, "Computer forensics: The need for standardization and certification," IJDE, vol. 3, no. 2, p. , 2004.
    • (2004) IJDE , vol.3 , Issue.2
    • Meyers, M.1    Rogers, M.2
  • 84
    • 77955374828 scopus 로고    scopus 로고
    • Digital forensics research: The next 10 years
    • the Proceedings of the Tenth Annual DFRWS Conference. [Online]. Available
    • S. L. Garfinkel, "Digital forensics research: The next 10 years," Digital Investigation, vol. 7, no. Supplement 1, pp. S64-S73, 2010, the Proceedings of the Tenth Annual DFRWS Conference. [Online]. Available: http://www.sciencedirect.com/science/article/B7CW4-50NX65H-B/2/ 19b42d7f2ccc4be6794c5a1330a551bb
    • (2010) Digital Investigation , vol.7 , Issue.SUPPL. 1
    • Garfinkel, S.L.1
  • 85
    • 68649110054 scopus 로고    scopus 로고
    • Bringing science to digital forensics with standardized forensic corpora
    • the Proceedings of the Ninth Annual DFRWS Conference. [Online]. Available
    • S. Garfinkel, P. Farrell, V. Roussev, and G. Dinolt, "Bringing science to digital forensics with standardized forensic corpora," Digital Investigation, vol. 6, no. Supplement 1, pp. S2-S11, 2009, the Proceedings of the Ninth Annual DFRWS Conference. [Online]. Available: http://www. sciencedirect.com/science/article/B7CW4-4X1HY5C-3/2/ 090ebc16025d598c775d87c8abbb7ae5
    • (2009) Digital Investigation , vol.6 , Issue.SUPPL. 1
    • Garfinkel, S.1    Farrell, P.2    Roussev, V.3    Dinolt, G.4
  • 86
    • 84943526145 scopus 로고    scopus 로고
    • Digital forensic research: The good, the bad and the unaddressed
    • G. Peterson and S. Shenoi, Eds. Springer Boston, 10.1007/978-3-642-04155- 6 2
    • N. Beebe, "Digital forensic research: The good, the bad and the unaddressed," in Advances in Digital Forensics V, ser. IFIP Advances in Information and Communication Technology, G. Peterson and S. Shenoi, Eds. Springer Boston, 2009, vol. 306, pp. 17-36, 10.1007/978-3-642-04155-6 2;.
    • (2009) Advances in Digital Forensics V, Ser. IFIP Advances in Information and Communication Technology , vol.306 , pp. 17-36
    • Beebe, N.1
  • 88
    • 77951743889 scopus 로고    scopus 로고
    • Digital forensics: Defining an education agenda
    • K. Nance, H. Armstrong, and C. J. Armstrong, "Digital forensics: Defining an education agenda," in HICSS, 2010, pp. 1-10.
    • (2010) HICSS , pp. 1-10
    • Nance, K.1    Armstrong, H.2    Armstrong, C.J.3
  • 90
    • 77955384148 scopus 로고    scopus 로고
    • Online; Status 02/11/2010
    • Digital Forensics Association, "Formal education: College education in digital forensics," http://www.digitalforensicsassociation.org/formal- education/, 2010, [Online; Status 02/11/2010].
    • (2010) Formal Education: College Education in Digital Forensics


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.