-
1
-
-
2642563293
-
-
Thesis presented to the Edwards S. Rogers Sr. Graduate Department of Electrical and Computer Engineering, University of Toronto, Toronto, Ontario. Retrieved September 11, 2007, from
-
Ahsan, K. (2002). Covert Channel Analysis and Data Hiding in TCP/IP. Thesis presented to the Edwards S. Rogers Sr. Graduate Department of Electrical and Computer Engineering, University of Toronto, Toronto, Ontario. Retrieved September 11, 2007, from http://gray-world.net/papers/ahsan02.pdf.
-
(2002)
Covert Channel Analysis and Data Hiding in TCP/IP
-
-
Ahsan, K.1
-
2
-
-
84867723779
-
-
Retrieved September 11, 2007
-
Akin, T. (2003). WebMail Forensics. BlackHat Briefings. Retrieved September 11, 2007, from http://www.blackhat.com/presentations/bh-usa-03/bh-us- 03-akin.pdf.
-
(2003)
WebMail Forensics
-
-
Akin, T.1
-
3
-
-
84867704426
-
Identifying non-volatile data storage areas: Unique notebook identification information as digital evidence
-
Budimir, N., & Slay, J. (2007). Identifying Non-Volatile Data Storage Areas: Unique Notebook Identification Information as Digital Evidence. Journal of Digital Forensics, Security and Law, 2(1), 75-91.
-
(2007)
Journal of Digital Forensics, Security and Law
, vol.2
, Issue.1
, pp. 75-91
-
-
Budimir, N.1
Slay, J.2
-
6
-
-
84867709353
-
-
Electronic Frontier Foundation (EFF), September 18, page. Retrieved September 18, 2007
-
Electronic Frontier Foundation (EFF). (2007, September 18). Tor Web page. Retrieved September 18, 2007, from http://tor.eff.org/index.html.en.
-
(2007)
Tor Web
-
-
-
7
-
-
84867706365
-
Analyzing the difficulties in backtracking the onion router's traffic
-
(August), Retrieved September 11, 2007
-
Forte, D. (2002, August). Analyzing the Difficulties in Backtracking the Onion Router's Traffic. Proceedings of the 2002 Digital Forensics Research Workshop. Retrieved September 11, 2007, from https://www.dfrws.org/2002/papers/ Papers/Dario-Forte.pdf.
-
(2002)
Proceedings of the 2002 Digital Forensics Research Workshop
-
-
Forte, D.1
-
8
-
-
85008016160
-
Scrubbing stubborn data: An evaluation of counter- forensic privacy tools
-
September/October
-
Geiger, M., & Cranor, L.F. (2006, September/October). Scrubbing Stubborn Data: An Evaluation of Counter- Forensic Privacy Tools. IEEE Security & Privacy, 4(5), 16-25.
-
(2006)
IEEE Security & Privacy
, vol.4
, Issue.5
, pp. 16-25
-
-
Geiger, M.1
Cranor, L.F.2
-
9
-
-
84867730623
-
-
Guidance Software. (July 26). Retrieved September 11, 2007
-
Guidance Software. (2007, July 26). Guidance Software Response to iSEC Report. Retrieved September 11, 2007, from http://www.securityfocus.com/archive/ 1/474727.
-
(2007)
Guidance Software Response to ISEC Report
-
-
-
10
-
-
33745977740
-
Arriving at an anti-forensics consensus: Examining how to define and control the anti- forensics problem
-
Retrieved September 11, 2007, from
-
Harris, R. (2006). Arriving at an Anti-Forensics Consensus: Examining How to Define and Control the Anti- Forensics Problem. Proceedings of the 2006 Digital Forensics Research Workshop. Digital Investigation, 3(S), S44-S49. Retrieved September 11, 2007, from http://dfrws.org/2006/proceedings/6-Harris. pdf.
-
(2006)
Proceedings of the 2006 Digital Forensics Research Workshop. Digital Investigation
, vol.3
, Issue.S
-
-
Harris, R.1
-
11
-
-
33847675252
-
An overview of steganography for the computer forensics examiner
-
July, Retrieved September 11, 2007
-
Kessler, G.C. (2004, July). An Overview of Steganography for the Computer Forensics Examiner. Forensics Science Communication, 6(3). Retrieved September 11, 2007, from http://www.fbi.gov/hq/lab/fsc/backissu/july2004/research/2004-03- research01.htm.
-
(2004)
Forensics Science Communication
, vol.6
, Issue.3
-
-
Kessler, G.C.1
-
12
-
-
0012360563
-
Denial of service attacks
-
M. Kabay & S. Bosworth (Eds.), 4th ed. New York: John Wiley & Sons
-
Levine, D.E., & Kessler, G.C. (2002). Denial of Service Attacks. In M. Kabay & S. Bosworth (Eds.), Computer Security Handbook, 4th ed. New York: John Wiley & Sons.
-
(2002)
Computer Security Handbook
-
-
Levine, D.E.1
Kessler, G.C.2
-
13
-
-
80052988326
-
Bleeding-edge anti-forensics
-
April 3, Presentation at, Retrieved September 11, 2007, from stachliu.com/files/InfoSecWorld-2006-K2-Bleeding-Edge- AntiForensics.ppt
-
Liu, V., & Brown, F. (2006, April 3). Bleeding-Edge Anti-Forensics. Presentation at InfoSec World 2006. Retrieved September 11, 2007, from stachliu.com/files/InfoSecWorld-2006-K2-Bleeding-Edge- AntiForensics.ppt.
-
(2006)
InfoSec World 2006
-
-
Liu, V.1
Brown, F.2
-
14
-
-
84867709356
-
-
Retrieved September 11, 2007
-
Metasploit LLC. (2007a). Metasploit Anti-forensics home page. Retrieved September 11, 2007, from http://www.metasploit.com/projects/antiforensics/).
-
(2007)
Metasploit Anti-forensics Home Page
-
-
-
15
-
-
84867739277
-
-
Retrieved September 11, 2007
-
Metasploit LLC. (2007b). Metasploit Project home page. Retrieved September 11, 2007, from http://www.metasploit.com/.
-
(2007)
Metasploit Project Home Page
-
-
-
16
-
-
84867704423
-
Breaking forensics software: Weaknesses in critical evidence collection
-
August 1, Retrieved September 11, 2007
-
Palmer, C., Newsham, T., Stamos, A., & Ridder, C. (2007, August 1). Breaking Forensics Software: Weaknesses in Critical Evidence Collection. Abstract of presentation at Black Hat USA 2007. Retrieved September 11, 2007, from http://www.blackhat.com/html/bh-usa-07/bh-usa-07-speakers.html#Palmer.
-
(2007)
Abstract of Presentation at Black Hat USA 2007
-
-
Palmer, C.1
Newsham, T.2
Stamos, A.3
Ridder, C.4
-
19
-
-
0012054514
-
-
May 5, First Monday, Retrieved September 11, 2007
-
Rowland, C.H. (1997, May 5). Covert Channels in the TCP/IP Protocol Suite. First Monday, 2(5). Retrieved September 11, 2007, from http://www.firstmonday.org/issues/issue2-5/rowland/.
-
(1997)
Covert Channels in the TCP/IP Protocol Suite
, vol.2
, Issue.5
-
-
Rowland, C.H.1
-
21
-
-
84867724321
-
-
Stego Archive Website. Retrieved September 11, 2007
-
StegoArchive.com. (2005). Stego Archive Website. Retrieved September 11, 2007, from http://www.stegoarchive.com.
-
(2005)
StegoArchive.com
-
-
-
22
-
-
0005078193
-
-
Supreme Court of the United States, 509 U.S. 579. Retrieved September 11, 2007
-
Supreme Court of the United States. (1993). Daubert v. Merrell Dow Pharmaceuticals (92-102), 509 U.S. 579. Retrieved September 11, 2007, from http://supct.law.cornell.edu/supct/html/92-102.ZS.html.
-
(1993)
Daubert v. Merrell Dow Pharmaceuticals
, pp. 92-102
-
-
-
23
-
-
65349154365
-
Digital evidence: Challenging the presumption of reliability
-
March
-
Van Buskirk, E., & Liu, V.T. (2006, March). Digital Evidence: Challenging the Presumption of Reliability. Journal of Digital Forensic Practice, 1(1), 19-26.
-
(2006)
Journal of Digital Forensic Practice
, vol.1
, Issue.1
, pp. 19-26
-
-
Van Buskirk, E.1
Liu, V.T.2
|