-
1
-
-
0038205937
-
The role of criminal profiling in the computer forensics process
-
Rodgers, M.: The role of criminal profiling in the computer forensics process. Computers & Security 22(4), 292-298 (2003)
-
(2003)
Computers & Security
, vol.22
, Issue.4
, pp. 292-298
-
-
Rodgers, M.1
-
3
-
-
3042776963
-
Time and date issues in forensic computing a case study
-
Boyd, C., Forster, P.: Time and date issues in forensic computing a case study. Digital Investigation 1(1), 18-23 (2004)
-
(2004)
Digital Investigation
, vol.1
, Issue.1
, pp. 18-23
-
-
Boyd, C.1
Forster, P.2
-
4
-
-
84881152315
-
A brief study of time
-
Buchholz, F., Tjaden, B.: A brief study of time. In: Proceedings of the 7th Digital Forensics Workshop, Pittsburg, Pennsylvania, USA (August 2007)
-
Proceedings of the 7th Digital Forensics Workshop, Pittsburg, Pennsylvania, USA (August 2007)
-
-
Buchholz, F.1
Tjaden, B.2
-
5
-
-
0026202534
-
Logical time in distributed computing systems
-
Fidge, C.: Logical time in distributed computing systems. Computer 24(1), 28-33 (1991)
-
(1991)
Computer
, vol.24
, Issue.1
, pp. 28-33
-
-
Fidge, C.1
-
7
-
-
0017996760
-
Time, clocks, and the ordering of events in a distributed system
-
Lamport, L.: Time, clocks, and the ordering of events in a distributed system. Communications of the ACM 21(1), 558-565 (1978)
-
(1978)
Communications of the ACM
, vol.21
, Issue.1
, pp. 558-565
-
-
Lamport, L.1
-
8
-
-
84881150118
-
Event-based computer profiling for the forensic reconstruction of computer activity
-
Marrington, A., Mohay, G., Clark, A., Morarji, H.: Event-based computer profiling for the forensic reconstruction of computer activity. In: Proceedings of the AusCERT Asia Pacific Information Technology Security Conference, Gold Coast, Australia (May 2007)
-
Proceedings of the AusCERT Asia Pacific Information Technology Security Conference, Gold Coast, Australia (May 2007)
-
-
Marrington, A.1
Mohay, G.2
Clark, A.3
Morarji, H.4
-
9
-
-
77952402347
-
A Model for Computer Profiling
-
Marrington, A., Mohay, G., Morarji, H., Clark, A.: A Model for Computer Profiling. In: Proceedings of the 5th International Workshop on Digital Forensics at the International Conference on Availability, Reliability and Security, Krakow, Poland (February 2010)
-
Proceedings of the 5th International Workshop on Digital Forensics at the International Conference on Availability, Reliability and Security, Krakow, Poland (February 2010)
-
-
Marrington, A.1
Mohay, G.2
Morarji, H.3
Clark, A.4
-
10
-
-
33746015003
-
-
Software Engineering Institute, Carnegie Mellon University, Pittsburg, USA May
-
Nolan, R., O'Sullivan, C., Branson, J., Waits, C.: First responder's guide to computer forensics. Software Engineering Institute, Carnegie Mellon University, Pittsburg, USA (May 2005)
-
(2005)
First Responder's Guide to Computer Forensics
-
-
Nolan, R.1
O'Sullivan, C.2
Branson, J.3
Waits, C.4
-
11
-
-
84864599047
-
A correlation method for establishing provenance of timestamps in digital evidence
-
Schatz, B., Mohay, G., Clark, A.: A correlation method for establishing provenance of timestamps in digital evidence. In: Proceedings of the 6th Annual Digital Forensic Research Workshop, West Lafayette, Indiana, USA (August 2006)
-
Proceedings of the 6th Annual Digital Forensic Research Workshop, West Lafayette, Indiana, USA (August 2006)
-
-
Schatz, B.1
Mohay, G.2
Clark, A.3
-
12
-
-
51149114414
-
Hypothesis-based investigation of digital timestamps
-
Willassen, S.Y.: Hypothesis-based investigation of digital timestamps. Advances in Digital Forensics IV 285(1), 75-86 (2008)
-
(2008)
Advances in Digital Forensics IV
, vol.285
, Issue.1
, pp. 75-86
-
-
Willassen, S.Y.1
-
13
-
-
84881148080
-
Timestamp evidence correlation by model based clock hypothesis testing
-
Willassen, S.Y.: Timestamp evidence correlation by model based clock hypothesis testing. In: Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop, Adelaide, Australia (January 2008)
-
Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop, Adelaide, Australia (January 2008)
-
-
Willassen, S.Y.1
-
15
-
-
84867036619
-
A Formal Temporal Log Model for the synchronized Virtual Machine Environment
-
Thorpe, S., Ray, I., Grandison, T.: A Formal Temporal Log Model for the synchronized Virtual Machine Environment. Journal of Information Assurance and Security 6(5), 398-406 (2011)
-
(2011)
Journal of Information Assurance and Security
, vol.6
, Issue.5
, pp. 398-406
-
-
Thorpe, S.1
Ray, I.2
Grandison, T.3
-
16
-
-
84881123219
-
Towards a Formal Parameterized Context for a Cloud Computing Forensic Database
-
Thorpe, S., Ray, I., Barbir, A., Grandison, T.: Towards a Formal Parameterized Context for a Cloud Computing Forensic Database. In: Proceedings of the 3rd Digital Forensics and Cybercrime Conference, Dublin, Ireland (October 2011)
-
Proceedings of the 3rd Digital Forensics and Cybercrime Conference, Dublin, Ireland (October 2011)
-
-
Thorpe, S.1
Ray, I.2
Barbir, A.3
Grandison, T.4
-
17
-
-
84881193378
-
Associative Mapping Techniques for the synchronized virtual machine environment
-
Thorpe, S., Ray, I., Grandison, T.: Associative Mapping Techniques for the synchronized virtual machine environment. In: Proceedings of the 4th Computational Intelligence in Security for Information Systems Conference, Torremolinos, Spain (June 2011)
-
Proceedings of the 4th Computational Intelligence in Security for Information Systems Conference, Torremolinos, Spain (June 2011)
-
-
Thorpe, S.1
Ray, I.2
Grandison, T.3
-
18
-
-
84881171265
-
Enforcing Data Quality Rules for the synchronized virtual machine environment
-
Thorpe, S., Ray, I., Grandison, T.: Enforcing Data Quality Rules for the synchronized virtual machine environment. In: Proceedings of the 4th Computational Intelligence in Security for Information Systems Conference, Torremolinos, Spain (June 2011)
-
Proceedings of the 4th Computational Intelligence in Security for Information Systems Conference, Torremolinos, Spain (June 2011)
-
-
Thorpe, S.1
Ray, I.2
Grandison, T.3
-
20
-
-
84901619784
-
A Virtual Machine History Model Framework for a Data Cloud Investigation
-
Thorpe, S.: A Virtual Machine History Model Framework for a Data Cloud Investigation. Journal of Convergence 3(4), 9-14 (2012)
-
(2012)
Journal of Convergence
, vol.3
, Issue.4
, pp. 9-14
-
-
Thorpe, S.1
-
21
-
-
78650023378
-
Trail of Bytes: Efficient support for Forensic Analysis
-
Srinivas, K., Snow, K., Monrose, F.: Trail of Bytes: Efficient support for Forensic Analysis. In: Proceedings of the ACM Conference on Communication Security, Chicago, Illinois, USA (October 2010)
-
Proceedings of the ACM Conference on Communication Security, Chicago, Illinois, USA (October 2010)
-
-
Srinivas, K.1
Snow, K.2
Monrose, F.3
-
22
-
-
84871893367
-
A Comprehensive Survey of Event Analytics
-
Gidwani, T., Argano, M., Yan, W., Issa, F.: A Comprehensive Survey of Event Analytics. International Journal of Digital Crime and Forensics 4(3), 33-46 (2012)
-
(2012)
International Journal of Digital Crime and Forensics
, vol.4
, Issue.3
, pp. 33-46
-
-
Gidwani, T.1
Argano, M.2
Yan, W.3
Issa, F.4
-
23
-
-
84881172780
-
A Model for Compiling Truthful Forensic Evidence from the Log Cloud Hypervisor Databases
-
Thorpe, S., Ray, I., Grandison, T., Barbir, A.: A Model for Compiling Truthful Forensic Evidence from the Log Cloud Hypervisor Databases. In: Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC), Work in Progress Session, Orlando, USA (December 2012)
-
Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC), Work in Progress Session, Orlando, USA (December 2012)
-
-
Thorpe, S.1
Ray, I.2
Grandison, T.3
Barbir, A.4
-
24
-
-
84881191883
-
Log Audit Explanation Templates with Private Data Clouds
-
Thorpe, S., Ray, I., Grandison, T., Barbir, A.: Log Audit Explanation Templates with Private Data Clouds. In: Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC), Work in Progress Session, Orlando, USA (December 2012)
-
Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC), Work in Progress Session, Orlando, USA (December 2012)
-
-
Thorpe, S.1
Ray, I.2
Grandison, T.3
Barbir, A.4
-
25
-
-
77958117537
-
Visual and algorithmic tooling for system trace analysis: A case study
-
Pauw, W., Heisig, S.: Visual and algorithmic tooling for system trace analysis: A case study. ACMSIGOPS Operating System Review 44(1), 97-102 (2010)
-
(2010)
ACMSIGOPS Operating System Review
, vol.44
, Issue.1
, pp. 97-102
-
-
Pauw, W.1
Heisig, S.2
|