-
2
-
-
33745211604
-
Live forensics: Diagnosing your system without killing it first
-
Adlestein, F. (2006) 'Live forensics: diagnosing your system without killing it first'. Communications of the ACM, Vol. 49, No. 2, pp.63-66.
-
(2006)
Communications of the ACM
, vol.49
, Issue.2
, pp. 63-66
-
-
Adlestein, F.1
-
3
-
-
33746021102
-
Categories of digital investigation analysis techniques based on the computer history model
-
DOI 10.1016/j.diin.2006.06.011, PII S1742287606000739
-
Carrier, B. and Spafford, E. (2006) 'Categories of digital investigation analysis techniques based on the computer history model', Digital Investigation, Vol. 3S, pp.121-130. (Pubitemid 44066911)
-
(2006)
Digital Investigation
, vol.3
, Issue.SUPPL.
, pp. 121-130
-
-
Carrier, B.D.1
Spafford, E.H.2
-
4
-
-
66149170813
-
-
15th ACM Conference on Computer and Communications Security, 27-31 October, Virginia, USA
-
Chan, E., Carlyle, J., David, F., Farivar, R. and Campbell, R. (2008) 'BootJacker: compromising computers using forced restarts' 15th ACM Conference on Computer and Communications Security, 27-31 October, Virginia, USA.
-
(2008)
BootJacker: Compromising Computers Using Forced Restarts
-
-
Chan, E.1
Carlyle, J.2
David, F.3
Farivar, R.4
Campbell, R.5
-
5
-
-
34447513980
-
Carving contiguous and fragmented files with fast object validation
-
DOI 10.1016/j.diin.2007.06.017, PII S1742287607000369
-
Garfinkel, S. (2007) 'Carving contiguous and fragmented files with fast object validation', Digital Investigation, Supplement, Vol. 4, pp.2-12. (Pubitemid 47081435)
-
(2007)
Digital Investigation
, vol.4
, Issue.SUPPL.
, pp. 2-12
-
-
Garfinkel, S.L.1
-
6
-
-
48749098660
-
Forensic analysis of the Windows registry in memory
-
Gavitt, B. (2008) 'Forensic analysis of the Windows registry in memory', Digital Investigation, Supplement, Vol. 5, pp.26-32.
-
(2008)
Digital Investigation, Supplement
, vol.5
, pp. 26-32
-
-
Gavitt, B.1
-
7
-
-
0004610703
-
Secure deletion of data from magnetic and solid-state memory
-
San Jose, California, 22-25 July
-
Gutmann, P. (1996) 'Secure deletion of data from magnetic and solid-state memory', Sixth USENIX Security Symposium, San Jose, California, 22-25 July, pp.77-89.
-
(1996)
Sixth USENIX Security Symposium
, pp. 77-89
-
-
Gutmann, P.1
-
8
-
-
85084163443
-
Data remanence in semiconductor devices
-
Gutmann, P. (2001) 'Data remanence in semiconductor devices', 10th USENIX Security Symposium, pp.39-54.
-
(2001)
10th USENIX Security Symposium
, pp. 39-54
-
-
Gutmann, P.1
-
9
-
-
85077701725
-
Lest we remember: Cold boot attacks on encryption key
-
Halderman, J., Schoen, S., Heninger, N., Clarkson, W.P.J., Calandrino, A., Feldman, A. Appelbaum, J. and Felte, E. (2008) 'Lest we remember: cold boot attacks on encryption key', 2008 USENIX Security Symposium.
-
(2008)
2008 USENIX Security Symposium
-
-
Halderman, J.1
Schoen, S.2
Heninger, N.3
Clarkson, W.P.J.4
Calandrino, A.5
Feldman, A.6
Appelbaum, J.7
Felte, E.8
-
10
-
-
72449162905
-
-
National Institute of Justice (NIJ), 2nd ed., (accessed on 20 June 2011)
-
National Institute of Justice (NIJ) (2008) Electronic Crime Scene Investigation: A Guide for First Responders, 2nd ed., available at http://www.ncjrs.gov/pdffiles1/nij/ 219941.pdf (accessed on 20 June 2011).
-
(2008)
Electronic Crime Scene Investigation: A Guide for First Responders
-
-
-
11
-
-
48749118027
-
Forensic memory analysis: Files. Mapped in memory
-
van Baar, R., Alink, W. and van Ballegooij, A. (2008) 'Forensic memory analysis: files. Mapped in memory', Digital Investigation, Supplement, Vol. 5, pp.52-57.
-
(2008)
Digital Investigation, Supplement
, vol.5
, pp. 52-57
-
-
Van Baar, R.1
Alink, W.2
Van Ballegooij, A.3
|