-
13
-
-
84958754081
-
Cloud forensics
-
Ruan, K., Carthy, J., Kechadi, T., and Crosbie, M., "Cloud Forensics", Advances in Digital Forensics VII, 2011, pp. 35-46.
-
(2011)
Advances in Digital Forensics VII
, pp. 35-46
-
-
Ruan, K.1
Carthy, J.2
Kechadi, T.3
Crosbie, M.4
-
14
-
-
77955574175
-
Digital evidence in cloud computing systems
-
Taylor, M., Haggerty, J., Gresty, D., and Hegarty, R., "Digital Evidence in Cloud Computing Systems", Computer Law & Security Review, 26(3), 2010, pp. 304-308.
-
(2010)
Computer Law & Security Review
, vol.26
, Issue.3
, pp. 304-308
-
-
Taylor, M.1
Haggerty, J.2
Gresty, D.3
Hegarty, R.4
-
15
-
-
84870279159
-
Cloud computing storms
-
Biggs, S., and Vidalis, S., "Cloud Computing Storms", International Journal of Intelligent Computing Research, 1(1), 2010, pp. 63-72.
-
(2010)
International Journal of Intelligent Computing Research
, vol.1
, Issue.1
, pp. 63-72
-
-
Biggs, S.1
Vidalis, S.2
-
16
-
-
84870277066
-
Calm before the storm: The challenges of cloud computing in digital forensics
-
Grispos, G., Storer, T., and Glisson, W.B., "Calm before the Storm: The Challenges of Cloud Computing in Digital Forensics", International Journal of Digital Crime and Forensics, 4(2), 2012, pp. 28-48.
-
(2012)
International Journal of Digital Crime and Forensics
, vol.4
, Issue.2
, pp. 28-48
-
-
Grispos, G.1
Storer, T.2
Glisson, W.B.3
-
17
-
-
79951489100
-
Cloud computing: Forensic challenges for law enforcement
-
Reilly, D., Wren, C., and Berry, T., "Cloud Computing: Forensic Challenges for Law Enforcement", International Conference for Internet Technology and Secured Transactions (ICITST), 2010, pp. 1-7.
-
(2010)
International Conference for Internet Technology and Secured Transactions (ICITST)
, pp. 1-7
-
-
Reilly, D.1
Wren, C.2
Berry, T.3
-
19
-
-
85056034582
-
Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques
-
Dykstra, J., and Sherman, A.T., "Acquiring Forensic Evidence from Infrastructure-as-a-Service Cloud Computing: Exploring and Evaluating Tools, Trust, and Techniques", Digital Forensic Research Workshop (DFRWS), 2012
-
(2012)
Digital Forensic Research Workshop (DFRWS)
-
-
Dykstra, J.1
Sherman, A.T.2
-
20
-
-
84904009352
-
Isolating a cloud instance for a digital forensic investigation
-
Delport, W., Olivier, M.S., and Kohn, M., "Isolating a Cloud Instance for a Digital Forensic Investigation", 2011 Information Security for South Africa, 2011
-
(2011)
2011 Information Security for South Africa
-
-
Delport, W.1
Olivier, M.S.2
Kohn, M.3
-
24
-
-
80051672577
-
A comparison of forensic evidence recovery techniques for a windows mobile smart phone
-
Grispos, G., Storer, T., and Glisson, W.B., "A Comparison of Forensic Evidence Recovery Techniques for a Windows Mobile Smart Phone", Digital Investigation, 8(1), 2011, pp. 23-36.
-
(2011)
Digital Investigation
, vol.8
, Issue.1
, pp. 23-36
-
-
Grispos, G.1
Storer, T.2
Glisson, W.B.3
-
25
-
-
80053916164
-
Electronic retention: What does your mobile phone reveal about you?
-
Glisson, W., Storer, T., Mayall, G., Moug, I., and Grispos, G., "Electronic Retention: What Does Your Mobile Phone Reveal About You?", International Journal of Information Security, 10(6), 2011, pp. 337-349.
-
(2011)
International Journal of Information Security
, vol.10
, Issue.6
, pp. 337-349
-
-
Glisson, W.1
Storer, T.2
Mayall, G.3
Moug, I.4
Grispos, G.5
-
27
-
-
79952945178
-
Third party application forensics on apple mobile devices
-
Levinson, A., Stackpole, B., and Johnson, D., "Third Party Application Forensics on Apple Mobile Devices", System Sciences (HICSS), 2011 44th Hawaii International Conference on, 2011, pp. 1-9.
-
(2011)
System Sciences (HICSS) 2011 44th Hawaii International Conference on
, pp. 1-9
-
-
Levinson, A.1
Stackpole, B.2
Johnson, D.3
-
29
-
-
84875537359
-
-
Cellebrite UFED, http://www.cellebrite.com/mobileforensics-products/ forensics-products.html
-
Cellebrite UFED
-
-
-
30
-
-
84875483507
-
-
What is XRY?, http://www.msab.com/xry/what-is-xry
-
What Is XRY?
-
-
-
31
-
-
84868536266
-
An overall assessment of mobile internal acquisition tool
-
Distefano, A., and Me, G., "An Overall Assessment of Mobile Internal Acquisition Tool", Digital Investigation, 5, Supplement(0), 2008, pp. S121-S127.
-
(2008)
Digital Investigation
, vol.5
, Issue.SUPPL.
-
-
Distefano, A.1
Me, G.2
-
32
-
-
84875521372
-
-
Device Seizure, http://www.paraben.com/deviceseizure.html
-
Device Seizure
-
-
-
33
-
-
84875513698
-
-
RAPI Tools, http://itsme.home.xs4all.nl/projects/xda/tools.html
-
RAPI Tools
-
-
-
37
-
-
85010929303
-
-
Hoog, A., and Strzempka, K., Iphone and Ios Forensics - Investigation, Analysis and Mobile Security for Apple Iphone, Ipad and Ios Devices, Syngress, 2011.
-
(2011)
Iphone and Ios Forensics - Investigation, Analysis and Mobile Security for Apple Iphone Ipad and Ios Devices, Syngress
-
-
Hoog, A.1
Strzempka, K.2
|