-
3
-
-
84885885131
-
-
(July 23, The UCD Centre for Cybercrime Investigation, July 26, 2010
-
James, J.: Survey of Evidence and Forensic Tool Usage in Digital Investigations (July 23,2010), The UCD Centre for Cybercrime Investigation, http://cci.ucd.ie/content/survey-evidence-and-forensic-toolusage-digital-investigations (July 26, 2010)
-
(2010)
Survey of Evidence and Forensic Tool Usage In Digital Investigations
-
-
James, J.1
-
5
-
-
51349152715
-
Cyber Criminal Activity Analysis Models using Markov Chain for Digital Forensics
-
Kim, D.H., In, D.H.: Cyber Criminal Activity Analysis Models using Markov Chain for Digital Forensics. In: ISA, pp. 193-198 (2008)
-
(2008)
ISA
, pp. 193-198
-
-
Kim, D.H.1
In, D.H.2
-
7
-
-
1542492748
-
Identifying Significant Features for Network Forensic Analysis Using Artificial Intelligent Techniques
-
Mukkamala, S., Sung, A.H.: Identifying Significant Features for Network Forensic Analysis Using Artificial Intelligent Techniques. International Journal of Digital Evidence 1.4 (2003)
-
(2003)
International Journal of Digital Evidence
, vol.1
, pp. 4
-
-
Mukkamala, S.1
Sung, A.H.2
-
8
-
-
77954958431
-
Neural Correlates of Speciestypical Illogical Cognitive Bias in Human Inference
-
Massachusetts Institute of Technology, doi:10.1162/jocn.2009.21330
-
Ogawa, A., Yamazaki, Y., Ueno, K., Cheng, K., Iriki, A.: Neural Correlates of Speciestypical Illogical Cognitive Bias in Human Inference. Journal of Cognitive Neuroscience, Massachusetts Institute of Technology (2009), doi:10.1162/jocn.2009.21330
-
(2009)
Journal of Cognitive Neuroscience
-
-
Ogawa, A.1
Yamazaki, Y.2
Ueno, K.3
Cheng, K.4
Iriki, A.5
-
9
-
-
84885893542
-
-
November, Computer Forensics Miscellany, Febuary 2, 2010
-
Personage, H.: The Meaning of (L)inkfiles (I)n (F)orensic (E)xaminations (November 2009). Computer Forensics Miscellany, http://computerforensics.parsonage.co.uk/downloads/TheMeaningofLIFE.pdf (Febuary 2, 2010)
-
(2009)
The Meaning of (L)inkfiles (I)n (F)orensic (E)xaminations
-
-
Personage, H.1
-
10
-
-
84885891927
-
-
May 3, Febuary 2, 2010
-
Roiter, N.: When signature based antivirus isn't enough (May 3, 2007), http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1253602,00.html (Febuary 2, 2010)
-
(2007)
When Signature Based Antivirus Isn't Enough
-
-
Roiter, N.1
-
11
-
-
72949091618
-
-
Feburary 3
-
Russinovich, M.: Inside the Registry (Feburary 3, 2010), http://technet.microsoft.com/enus/library/cc750583.aspx
-
(2010)
Inside the Registry
-
-
Russinovich, M.1
-
12
-
-
42449117164
-
-
Special Publication. NIST, National Institute of Science and Technology. National Institute of Science and Technology, Gaithersburg
-
Scarfone, K., Mell, P.: Guide to Intrusion Detection and Prevention Systems (IDPS) SP800-94. Special Publication. NIST: National Institute of Science and Technology. National Institute of Science and Technology, Gaithersburg (2007)
-
(2007)
Guide to Intrusion Detection and Prevention Systems (IDPS) SP800-94
-
-
Scarfone, K.1
Mell, P.2
-
14
-
-
84881148080
-
Timestamp evidence correlation by model based clock hypothesis testing
-
Information, and Multimedia and Workshop, ICST, Brussels, Belgium
-
Willassen, S.Y.: Timestamp evidence correlation by model based clock hypothesis testing. In: Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop, ICST, Brussels, Belgium, pp. 1-6 (2008)
-
(2008)
Proceedings of the 1st International Conference On Forensic Applications and Techniques In Telecommunications
, pp. 1-6
-
-
Willassen, S.Y.1
-
15
-
-
68649109486
-
-
Digital Investigation, doi:10.1016/j.diin.2009.02.004
-
Zhu, Y., James, J., Gladyshev, P.: A comparative methodology for the reconstruction of digital events using Windows Restore Points. Digital Investigation (2009a), doi:10.1016/j.diin.2009.02.004
-
(2009)
A Comparative Methodology For the Reconstruction of Digital Events Using Windows Restore Points
-
-
Zhu, Y.1
James, J.2
Gladyshev, P.3
-
17
-
-
84868594171
-
Using ShellBag Information to Reconstruct User Activities
-
doi:10.1016/j.diin.2009.06.009
-
Zhu, Y., Gladyshev, P., James, J.: Using ShellBag Information to Reconstruct User Activities. Digital Investigation 6, 69-77 (2009c), doi:10.1016/j.diin.2009.06.009
-
(2009)
Digital Investigation
, vol.6
, pp. 69-77
-
-
Zhu, Y.1
Gladyshev, P.2
James, J.3
|