-
1
-
-
84958762439
-
An Investigative Framework for Incident Analysis
-
Peterson, G., Shenoi, S. (eds.) Springer, Heidelberg
-
Blackwell, C.: An Investigative Framework for Incident Analysis. In: Peterson, G., Shenoi, S. (eds.) Advances in Digital Forensics, Part VII, pp. 23-34. Springer, Heidelberg (2011)
-
(2011)
Advances in Digital Forensics, Part VII
, pp. 23-34
-
-
Blackwell, C.1
-
2
-
-
84925822906
-
Regulation of Converged Communications Surveillance
-
Nyeland, D., Goold, B. (eds.) Willan
-
Brown, I.: Regulation of Converged Communications Surveillance. In: Nyeland, D., Goold, B. (eds.) New Directions in Surveillance and Privacy, pp. 39-73. Willan (2009)
-
(2009)
New Directions in Surveillance and Privacy
, pp. 39-73
-
-
Brown, I.1
-
3
-
-
84863932156
-
Lawful Interception; Requirements of Law Enforcement Agencies
-
European Telecommunications Standards Institute (ETSI)
-
European Telecommunications Standards Institute (ETSI): Lawful Interception; Requirements of Law Enforcement Agencies. Technical Specification 101: 331 (2009)
-
(2009)
Technical Specification
, vol.101
, pp. 331
-
-
-
5
-
-
77952339533
-
A Multi-component View of Digital Forensics
-
Aleksy, M., Ghernaouti-Helie, S., Quirchmayr, G. (eds.)
-
Grobler, C., Louwrens, C., Von Solms, S.: A Multi-component View of Digital Forensics. In: Aleksy, M., Ghernaouti-Helie, S., Quirchmayr, G. (eds.) International Conference on Avaiability Reliability and Security (ARES 2010), pp. 647-652 (2010)
-
(2010)
International Conference on Avaiability Reliability and Security (ARES 2010)
, pp. 647-652
-
-
Grobler, C.1
Louwrens, C.2
Von Solms, S.3
-
6
-
-
33746255206
-
FORZA - Digital forensics investigation framework that incorporate legal issues
-
Ieong, S.C.R.: FORZA - Digital forensics investigation framework that incorporate legal issues. Digital Investigation 3(suppl.1), 29-36 (2006)
-
(2006)
Digital Investigation
, vol.3
, Issue.SUPPL. 1
, pp. 29-36
-
-
Ieong, S.C.R.1
-
7
-
-
77956382087
-
A survey of mobile phone sensing
-
Lane, N., Miluzzo, E., Ly, H., Peebles, D., Choudhury, T., Campbell, A.: A survey of mobile phone sensing. IEEE Communications Magazine 48(9), 140-150 (2010)
-
(2010)
IEEE Communications Magazine
, vol.48
, Issue.9
, pp. 140-150
-
-
Lane, N.1
Miluzzo, E.2
Ly, H.3
Peebles, D.4
Choudhury, T.5
Campbell, A.6
-
9
-
-
77952101825
-
The growing need for on-scene triage of mobile devices
-
Mislan, R.P., Casey, E., Kessler, G.C.: The growing need for on-scene triage of mobile devices. Digital Investigation 6(3-4), 112-124 (2010)
-
(2010)
Digital Investigation
, vol.6
, Issue.3-4
, pp. 112-124
-
-
Mislan, R.P.1
Casey, E.2
Kessler, G.C.3
-
10
-
-
84863975372
-
Data Retention: A Pandora Box for Rights and Liberties?
-
Acquisti, A., De Capitani di Vimercati, S., Gritzalis, S., Lambrinoudakis, C. (eds.) Auerbach Publications
-
Mitrou, L.: Data Retention: a Pandora Box for Rights and Liberties? In: Acquisti, A., De Capitani di Vimercati, S., Gritzalis, S., Lambrinoudakis, C. (eds.) Digital Privacy: Theory, Technologies and Practices, pp. 410-433. Auerbach Publications (2008)
-
(2008)
Digital Privacy: Theory, Technologies and Practices
, pp. 410-433
-
-
Mitrou, L.1
-
12
-
-
84863964653
-
-
M.Sc. Thesis, Royal Holloway, University of London
-
Mylonas, A.: Smartphone spying tools. M.Sc. Thesis, Royal Holloway, University of London (2008)
-
(2008)
Smartphone Spying Tools
-
-
Mylonas, A.1
-
13
-
-
50849087527
-
Computer forensics field triage process model
-
Rogers, M., Goldman, J., Mislan, R., Wedge, T., Debrota, S.: Computer forensics field triage process model. In: Proceeding of the Conference on Digital Forensics Security and Law, pp. 27-40 (2006)
-
(2006)
Proceeding of the Conference on Digital Forensics Security and Law
, pp. 27-40
-
-
Rogers, M.1
Goldman, J.2
Mislan, R.3
Wedge, T.4
Debrota, S.5
-
14
-
-
84863934584
-
Acquiring Volatile Operating System Data Tools and Techniques
-
Sutherland, I., Evans, J., Tryfonas, T., Blyth, A.: Acquiring Volatile Operating System Data Tools and Techniques. SIGOPS Operating System Review 42(3), 6-73 (2008)
-
(2008)
SIGOPS Operating System Review
, vol.42
, Issue.3
, pp. 6-73
-
-
Sutherland, I.1
Evans, J.2
Tryfonas, T.3
Blyth, A.4
-
16
-
-
77955342184
-
Live memory forensics of mobile phones
-
Thing, V., Ng, K.-Y., Chang, E.-C.: Live memory forensics of mobile phones. Digital Investigation 7(suppl.1), 74-82 (2010)
-
(2010)
Digital Investigation
, vol.7
, Issue.SUPPL. 1
, pp. 74-82
-
-
Thing, V.1
Ng, K.-Y.2
Chang, E.-C.3
-
18
-
-
84863943450
-
The new Fundamental Right to IT Security - First evaluation and comparative view at the U.S
-
Wiebe, A.: The new Fundamental Right to IT Security - First evaluation and comparative view at the U.S., Datenschutz und Datensicherheit, pp. 713-716 (2008)
-
(2008)
Datenschutz und Datensicherheit
, pp. 713-716
-
-
Wiebe, A.1
-
19
-
-
67849089096
-
Agents, Trojans and tags: The next generation of investigators
-
Wiebke, A.: Agents, Trojans and tags: The next generation of investigators. International Review of Law, Computers & Technology 23(1-2), 99-108 (2009)
-
(2009)
International Review of Law, Computers & Technology
, vol.23
, Issue.1-2
, pp. 99-108
-
-
Wiebke, A.1
-
20
-
-
0001134191
-
A framework for information systems architecture
-
Zachman, J.A.: A framework for information systems architecture. IBM Systems Journal 26(3), 276-292 (1987)
-
(1987)
IBM Systems Journal
, vol.26
, Issue.3
, pp. 276-292
-
-
Zachman, J.A.1
|