메뉴 건너뛰기




Volumn 8, Issue SUPPL., 2011, Pages

A system for the proactive, continuous, and efficient collection of digital forensic evidence

Author keywords

Deleted file logging; Evidence collection; File similarity; Proactive forensics; Search

Indexed keywords

SEARCH ENGINES; SEMANTICS;

EID: 79961078119     PISSN: 17422876     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.diin.2011.05.002     Document Type: Conference Paper
Times cited : (31)

References (40)
  • 1
    • 79961099108 scopus 로고    scopus 로고
    • United States Court of Appeals, Ninth Circuit. No. 05-30177 (1-30-07)
    • US v. Ziegler January 2007 http://caselaw.findlaw.com/us-9th-circuit/ 1102459.html United States Court of Appeals, Ninth Circuit. No. 05-30177 (1-30-07)
    • (2007) US V. Ziegler
  • 4
    • 3042776963 scopus 로고    scopus 로고
    • Time and date issues in forensic computing: A case Study
    • C. Boyd, and P. Forster Time and date issues in forensic computing: a case Study Digital Investigation 1 February 2004 18 23
    • (2004) Digital Investigation , vol.1 , pp. 18-23
    • Boyd, C.1    Forster, P.2
  • 7
    • 33847193441 scopus 로고    scopus 로고
    • Design and Implementation of zeitline: A forensic timeline editor
    • Buchholz F. Falk C. Design and Implementation of zeitline: a forensic timeline editor. In: Digital Forensics Research Workshop. 2005. p. 1-7.
    • (2005) Digital Forensics Research Workshop , pp. 1-7
    • Buchholz, F.1    Falk, C.2
  • 8
    • 10644245884 scopus 로고    scopus 로고
    • On the role of file system metadata in digital forensics
    • F. Buchholz, and E. Spafford On the role of file system metadata in digital forensics Digital Investigation 1 2004 298 309
    • (2004) Digital Investigation , vol.1 , pp. 298-309
    • Buchholz, F.1    Spafford, E.2
  • 9
    • 79961037207 scopus 로고    scopus 로고
    • Ex-Hacker New York Times
    • E. Bumiller Ex-Hacker Army leak suspect is turned in June 2010 New York Times http://www.nytimes.com/2010/06/08/world/08leaks.html
    • (2010) Army Leak Suspect Is Turned in
    • Bumiller, E.1
  • 17
    • 33745191834 scopus 로고    scopus 로고
    • Detection of video sequences using compact signatures
    • T. Hoad, and J. Zobel Detection of video sequences using compact signatures ACM Transactions on Information Systems 24 January 2006 1 50
    • (2006) ACM Transactions on Information Systems , vol.24 , pp. 1-50
    • Hoad, T.1    Zobel, J.2
  • 20
    • 52249094557 scopus 로고    scopus 로고
    • Identifying almost identical files using context triggered piecewise hashing
    • DOI 10.1016/j.diin.2006.06.015, PII S1742287606000764
    • J. Kornblum Identifying almost identical files using context triggered piecewise hashing Digital Investigation 3 2006 91 97 (Pubitemid 44088492)
    • (2006) Digital Investigation , vol.3 , Issue.SUPPL. , pp. 91-97
    • Kornblum, J.1
  • 22
    • 33644785939 scopus 로고    scopus 로고
    • Computer forensics and electronic discovery: The new management challenge
    • DOI 10.1016/j.cose.2006.01.002, PII S0167404806000186
    • V. Luoma Computer forensics and electronic discovery: the new management challenge Computers & Security 25 March 2006 91 96 (Pubitemid 43344208)
    • (2006) Computers and Security , vol.25 , Issue.2 , pp. 91-96
    • Luoma, V.M.1
  • 26
    • 68649112105 scopus 로고    scopus 로고
    • Computer forensic timeline visualization tool
    • J. Olsson, and M. Boldt Computer forensic timeline visualization tool Digital Investigation 6 September 2009 S78 S87
    • (2009) Digital Investigation , vol.6
    • Olsson, J.1    Boldt, M.2
  • 28
    • 77951751278 scopus 로고    scopus 로고
    • Master's thesis, Stockholm University/The Royal Institute of Technology, Stockholm. Sweden. May
    • Paintsil AB. Insider threat detection: a proactive forensic approach. Master's thesis, Stockholm University/The Royal Institute of Technology, Stockholm. Sweden. May 2007.
    • (2007) Insider Threat Detection: A Proactive Forensic Approach
    • Paintsil, A.B.1
  • 32
    • 34447525132 scopus 로고    scopus 로고
    • Multi-resolution similarity hashing
    • DOI 10.1016/j.diin.2008.01.001, PII S1742287607000473
    • Roussev V, III, Richard G, Marziale L. Multi-resolution similarity hashing. In: Digital Forensics Research Conference (DFRWS). 2007. p. 105-113. (Pubitemid 47081445)
    • (2007) Digital Investigation , vol.4 , Issue.SUPPL. , pp. 105-113
    • Roussev, V.1    Richard III, G.G.2    Marziale, L.3
  • 35
    • 34247356790 scopus 로고    scopus 로고
    • Precision and recall of five search engines for retrieval of scholarly information in the field of Biotechnology
    • S. Shafi, and R. Rather Precision and recall of five search engines for retrieval of scholarly information in the field of Biotechnology Webology 2 2 August 2005
    • (2005) Webology , vol.2 , Issue.2
    • Shafi, S.1    Rather, R.2
  • 39
    • 51249106649 scopus 로고    scopus 로고
    • Complexity analysis of retrieving knowledge from auditing log files for computer and network forensics and accountability
    • May
    • Takahashi D, Xiao Y. Complexity analysis of retrieving knowledge from auditing log files for computer and network forensics and accountability. In: 2008 IEEE International Conference on Communications. May 2008. p. 1474-1478.
    • (2008) 2008 IEEE International Conference on Communications , pp. 1474-1478
    • Takahashi, D.1    Xiao, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.