-
2
-
-
19944394838
-
Tracking USB storage: Analysis of windows artifacts generated by USB storage devices
-
Carvey Harlan, Altheide Cory. Tracking USB storage: analysis of windows artifacts generated by USB storage devices. Digital Invest 2005;2(2):94-100.
-
(2005)
Digital Invest
, vol.2
, Issue.2
, pp. 94-100
-
-
Harlan, C.1
Cory, A.2
-
4
-
-
34548132851
-
The rules of time on NTFS file system
-
DOI 10.1109/SADFE.2007.22, 4155351, Proceedings - SADFE 2007: Second International Workshop on Systematic Approaches to Digital Forensic Engineering
-
Chow KP, Law Frank YW, Kwan Michael YK, Lai Pierre K Y. The Rules of time on NTFS file system. Pages 71-85 of: SADFE '07. In: Proceedings of the second international workshop on systematic approaches to digital forensic engineering. Washington, DC, USA: IEEE Computer Society; 2007. (Pubitemid 47298632)
-
(2007)
Proceedings - SADFE 2007: Second International Workshop on Systematic Approaches to Digital Forensic Engineering
, pp. 71-85
-
-
Chow, K.P.1
Law, F.Y.W.2
Kwan, M.Y.K.3
Lai, P.K.Y.4
-
7
-
-
84868581394
-
-
[accessed 03.09.10]
-
Ferguson Michael. File system numbers, http://www.cs.cornell.edu/courses/ cs614/2002sp/Fileppt; 2002 [accessed 03.09.10].
-
(2002)
File System Numbers
-
-
Michael, F.1
-
8
-
-
79961083964
-
-
Free Software Foundation Inc. [accessed 03.09.10]
-
Free Software Foundation Inc.. GNU coreutils implementation, http://ftp.gnu.org/gnu/coreutils/coreutils-8.4.tar.gz; 2010 [accessed 03.09.10].
-
(2010)
GNU Coreutils Implementation
-
-
-
10
-
-
0032094349
-
Self-similarity in file systems
-
Gribble Steven D, Manku Gurmeet Singh, Roselli Drew, Brewer Eric A, Gibson Timothy J, Miller Ethan L. Self-similarity in file systems. SIGMETRICS Perform. Eval Rev 1998;26(1):141-50. (Pubitemid 128593230)
-
(1998)
Performance Evaluation Review
, vol.26
, Issue.1
, pp. 141-150
-
-
Gribble, S.D.1
Manku, G.S.2
Roselli, D.3
Brewer, E.A.4
Gibson, T.J.5
Miller, E.L.6
-
11
-
-
84868581205
-
Employee theft
-
Hillstrom Kevin, Hillstrom Laurie Collier, editors. 2nd ed. Farmington Hills, MI, USA: Gale Group/Thomson Learning
-
Hillstrom Kevin, Hillstrom Laurie Collier. Employee theft. In: Hillstrom Kevin, Hillstrom Laurie Collier, editors. Gale encyclopedia of small business. 2nd ed. Farmington Hills, MI, USA: Gale Group/Thomson Learning; 2002.
-
(2002)
Gale Encyclopedia of Small Business
-
-
Kevin, H.1
Collier, H.L.2
-
12
-
-
84868569823
-
-
[accessed 03. 09.10]
-
Kiriaty Yochay. Understanding windows 7 libraries, http:// windowsteamblog.com/blogs/developers/archive/2009/04/06/understanding-windows-7- libraries.aspx; 2009 [accessed 03. 09.10].
-
(2009)
Understanding Windows 7 Libraries
-
-
Yochay, K.1
-
13
-
-
63349106731
-
SIDD: A framework for detecting sensitive data exfiltration by an insider attack
-
Liu Yali, Corbett Cherita, Chiang Ken, Archibald Rennie, Mukherjee Biswanath, Ghosal Dipak. SIDD: a framework for detecting sensitive data exfiltration by an insider attack. Hawaii Int Conf Syst Sci 2009;0:1-10.
-
(2009)
Hawaii Int Conf Syst Sci
, pp. 1-10
-
-
Liu, Y.1
Corbett, C.2
Chiang, K.3
Archibald, R.4
Mukherjee, B.5
Ghosal, D.6
-
19
-
-
79961065791
-
-
[accessed 03.09.10]
-
Sun Microsystems Inc.. Solaris mv command implementation, http://src.opensolaris.org/sourse/xref/onnv/onnv-gate/usr/src/cmd/mv/mv.c; 2009a [accessed 03.09.10].
-
(2009)
Solaris Mv Command Implementation
-
-
-
20
-
-
79961033670
-
-
[accessed 03.09.10]
-
Sun Microsystems Inc.. Solaris writefile implementation, http://src.opensolaris.org/sourse/xref/onnv/onnv-gate/usr/src/lib/libcmdutils/ common.writefile.c; 2009b [accessed 03.09.10].
-
(2009)
Solaris Writefile Implementation
-
-
-
21
-
-
79961077322
-
File recovery techniques
-
74
-
Venema Wietse. File recovery techniques. Dr Dobb's J Software Tools 2000;25(12):76-80. 74.
-
(2000)
Dr Dobb's J Software Tools
, vol.25
, Issue.12
, pp. 76-80
-
-
Wietse, V.1
-
23
-
-
79961082793
-
-
[accessed 03.09.10]
-
Wikipedia. Pareto distribution, http://en.wikipedia.org/wiki/Pareto- distribution; 2010 [accessed 03.09.10].
-
(2010)
Pareto Distribution
-
-
|