-
2
-
-
77955406834
-
-
[Visited on May 22, 2007]
-
Betz C. MemParser, 〈http://www.dfrws.org/2005/challenge/memparser. html〉; 2005 [Visited on May 22, 2007].
-
(2005)
MemParser
-
-
Betz, C.1
-
4
-
-
84869678325
-
-
[Visited on May 22, 2007]
-
Debugging tools for Windows,〈http://www.microsoft.com/whdc/devtools/ debugging/default.mspx〉 [Visited on May 22, 2007].
-
Debugging Tools for Windows
-
-
-
6
-
-
0037421015
-
A new logic for electronic commerce protocols
-
DOI 10.1016/S0304-3975(02)00364-X, PII S030439750200364X
-
Debbabi M, Adi K, Mejri M. A new logic for electronic commerce protocols. Int J Theor Comput Sci (TCS) 2003;291(3):223-83. (Pubitemid 35460172)
-
(2003)
Theoretical Computer Science
, vol.291
, Issue.3
, pp. 223-283
-
-
Adi, K.1
Debbabi, M.2
Mejri, M.3
-
8
-
-
3042854565
-
Finite state machine approach to digital event reconstruction
-
Gladyshev P, Patel A. Finite state machine approach to digital event reconstruction. Digit Investig J 2004;1(2).
-
(2004)
Digit Investig J
, vol.1
, Issue.2
-
-
Gladyshev, P.1
Patel, A.2
-
9
-
-
33745983277
-
Formalising event time bounding in digital investigations
-
Gladyshev P, Patel A. Formalising event time bounding in digital investigations. Digit Investig J 2005;4(2).
-
(2005)
Digit Investig J
, vol.4
, Issue.2
-
-
Gladyshev, P.1
Patel, A.2
-
11
-
-
34447518105
-
-
[Visited on May 22, 2007]
-
Hosmer C. Time lining computer evidence, 〈http://www.wetstonetech. com/f/timelining.pdf〉; 1998 [Visited on May 22, 2007].
-
(1998)
Time Lining Computer Evidence
-
-
Hosmer, C.1
-
13
-
-
33847398384
-
Using every part of the buffalo in Windows memory analysis
-
January
-
Kornblum J. Using every part of the buffalo in Windows memory analysis. Digit Investig J January 2007.
-
(2007)
Digit Investig J
-
-
Kornblum, J.1
-
19
-
-
84944715924
-
Automated analysis for digital forensic science: Semantic integrity checking
-
Las Vegas, NV, USA, December
-
Stallard T, Levitt K. Automated analysis for digital forensic science: semantic integrity checking. In: 19th annual computer security applications conference, Las Vegas, NV, USA, December 2003.
-
(2003)
19th Annual Computer Security Applications Conference
-
-
Stallard, T.1
Levitt, K.2
-
20
-
-
3042553947
-
Modeling of post-incident root cause analysis
-
Stephenson P. Modeling of post-incident root cause analysis. Int Digit Evid 2003;2(2).
-
(2003)
Int Digit Evid
, vol.2
, Issue.2
-
-
Stephenson, P.1
-
24
-
-
74049091891
-
Volatools: Integrating volatile memory forensics into the digital investigation process
-
February
-
Walters A, Petroni N. Volatools: integrating volatile memory forensics into the digital investigation process. Black Hat DC 2007; February 2007.
-
(2007)
Black Hat DC 2007
-
-
Walters, A.1
Petroni, N.2
|