-
2
-
-
33745970746
-
Selective and intelligent imaging using digital evidence bags
-
Retrieved September, 2009, from
-
Turner P. Selective and intelligent imaging using digital evidence bags. Digital Investigation 2007, 3(Supplement 3):59-64. Retrieved September, 2009, from http://www.dfrws.org/2006/proceedings/8-Turner.pdf.
-
(2007)
Digital Investigation
, vol.3
, Issue.SUPPL. 3
, pp. 59-64
-
-
Turner, P.1
-
3
-
-
33847357771
-
Applying a forensic approach to incident response, network investigation and system administration using digital evidence bags
-
Retrieved September, 2009, from
-
Turner P. Applying a forensic approach to incident response, network investigation and system administration using digital evidence bags. Digital Investigation 2007, 1(1):30-35. Retrieved September, 2009, from http://www.dfrws.org/2006/proceedings/8-Turner.pdf.
-
(2007)
Digital Investigation
, vol.1
, Issue.1
, pp. 30-35
-
-
Turner, P.1
-
4
-
-
82755166616
-
-
Guidelines for Evidence Collection and Archiving, Network Working Group, RFC3227, 2002. Retrieved August, From
-
D. Brezinski, T. Killalea, Guidelines for Evidence Collection and Archiving, Network Working Group, RFC3227, 2002. Retrieved August, 2009. From http://www.ietf.org/rfc/rfc3227.txt.
-
(2009)
-
-
Brezinski, D.1
Killalea, T.2
-
6
-
-
78651065137
-
Uncertainty in Live Forensics
-
Springer, Boston
-
Savoldi A., Gubian P., Echizen I. Uncertainty in Live Forensics. Advances in Digital Forensics, vol. IV 2010, 171-184. Springer, Boston.
-
(2010)
Advances in Digital Forensics, vol. IV
, pp. 171-184
-
-
Savoldi, A.1
Gubian, P.2
Echizen, I.3
-
7
-
-
50849087527
-
Computer forensics field triage process model
-
The Proceedings of the ADFSL 2006 Conference on Digital Forensics, Security and Law
-
M. Rogers, J. Goldman, R. Mislan, T. Wedge, S. Debrota, Computer forensics field triage process model, in: The Proceedings of the ADFSL 2006 Conference on Digital Forensics, Security and Law, vol. 1, 2006.
-
(2006)
, vol.1
-
-
Rogers, M.1
Goldman, J.2
Mislan, R.3
Wedge, T.4
Debrota, S.5
-
8
-
-
82755171500
-
-
Windd Windows Physical Memory Imaging Utility, Retrieved February, 2010, from
-
S. Matthieu, Windd Windows Physical Memory Imaging Utility, 2009. Retrieved February, 2010, from http://http://windd.msuiche.net/.
-
(2009)
-
-
Matthieu, S.1
-
9
-
-
33751342034
-
Fatkit: a framework for the extraction and analysis of digital forensic data from volatile system memory
-
Retrieved January, 2010, from
-
Petroni N., Walters A., Fraser T., Arbaugh W. Fatkit: a framework for the extraction and analysis of digital forensic data from volatile system memory. Digital Investigation 2006, 3(4):197-210. Retrieved January, 2010, from http://www.dfrws.org/2006/proceedings/2-Schuster.pdf.
-
(2006)
Digital Investigation
, vol.3
, Issue.4
, pp. 197-210
-
-
Petroni, N.1
Walters, A.2
Fraser, T.3
Arbaugh, W.4
-
10
-
-
33745993901
-
Searching for processes and threads in microsoft windows memory dumps
-
Retrieved January, 2010, from
-
Schuster A. Searching for processes and threads in microsoft windows memory dumps. Digital Investigation 2006, 3(Supplement 3):10-16. Retrieved January, 2010, from http://www.dfrws.org/2006/proceedings/2-Schuster.pdf.
-
(2006)
Digital Investigation
, vol.3
, Issue.SUPPL. 3
, pp. 10-16
-
-
Schuster, A.1
-
11
-
-
82755166618
-
-
PMDump Tool, Retrieved February, 2010, from
-
A. Vidstrom, PMDump Tool, 2007. Retrieved February, 2010, from http://www.ntsecurity.nu/toolbox/pmdump/.
-
(2007)
-
-
Vidstrom, A.1
-
14
-
-
82755175322
-
-
MSDN. CredEnumerate Function, 2009. Retrieved February,from
-
MSDN. CredEnumerate Function, 2009. Retrieved February, 2010, from http://msdn.microsoft.com/en-us/library/aa374794(VS.85).aspx.
-
(2010)
-
-
-
16
-
-
49049096776
-
Volatools: Integrating Volatile Memory Forensic into the Digital Investigation Process
-
Retrieved August, 2009, from
-
A. Walters, N. Petroni, Volatools: Integrating Volatile Memory Forensic into the Digital Investigation Process, 2007. Retrieved August, 2009, from http://www.blackhat.com/presentations/bh-dc-07/Walters/Paper/bh-dc-07-Walters-WP.pdf.
-
(2007)
-
-
Walters, A.1
Petroni, N.2
-
17
-
-
34447541122
-
Low Down and Dirty: Anti-forensic Rootkits
-
Retrieved August, 2009, from
-
D. Bilby, Low Down and Dirty: Anti-forensic Rootkits, 2006. Retrieved August, 2009, from http://www.blackhat.com/presentations/bh-jp-06/BH-JP-06-Bilby-up.pdf.
-
(2006)
-
-
Bilby, D.1
-
18
-
-
82755166613
-
-
He4Hook Rootkit. Retrieved August, from
-
He4Hook Rootkit. Retrieved August, 2009, from http://www.pandasecurity.com/homeusers/security-info/98568/He4Hook.A.
-
(2009)
-
-
-
19
-
-
82755175319
-
-
Baiyuanfan. New Thoughts in Ring3 NT Rootkit, Retrieved August, 2009, from
-
Baiyuanfan. New Thoughts in Ring3 NT Rootkit, 2005. Retrieved August, 2009, from http://xcon.xfocus.org/XCon2005/archives/2005/Xcon2005_Baiyuanfan.pdf.
-
(2005)
-
-
-
21
-
-
82755185442
-
-
DECAF, January Retrieved February, 2010, from
-
A. Vidstrom, DECAF, January 2010. Retrieved February, 2010, from http://www.decafme.org/.
-
(2010)
-
-
Vidstrom, A.1
-
22
-
-
82755166615
-
-
InstallSpy v.2.0, Retrieved February, 2010, from
-
M.J. Leaver, InstallSpy v.2.0, 2003. Retrieved February, 2010, from http://www.mjleaver.com/.
-
, vol.2003
-
-
Leaver, M.J.1
-
23
-
-
82755171493
-
-
Obrut, Retrieved April, 2010, from
-
A.J. Glina, Obrut, 2008. Retrieved April, 2010, from http://www.softpedia.com/get/Tweak/CPU-Tweak/Obrut.shtml.
-
(2008)
-
-
Glina, A.J.1
-
24
-
-
82755185440
-
-
Microsoft. Computer Online Forensic Evidence Extractor (COFEE), May 2008. Retrieved August, from.
-
Microsoft. Computer Online Forensic Evidence Extractor (COFEE), May 2008. Retrieved August, 2009, from. http://www.microsoft.com/industry/government/news/cofee_faq.mspx.
-
(2008)
-
-
-
25
-
-
82755171494
-
-
Guidance. EnCase Portable, May 2009. Retrieved April, from
-
Guidance. EnCase Portable, May 2009. Retrieved April, 2010, from http://www.guidancesoftware.com/encase-portable.htm.
-
(2010)
-
-
-
26
-
-
82755175318
-
-
ADF Solutions. Triage Live, May 2009. Retrieved April, from
-
ADF Solutions. Triage Live, May 2009. Retrieved April, 2010, from http://www.adfsolutions.com/.
-
(2010)
-
-
|