-
1
-
-
84903173528
-
-
accessed November 2013
-
http://www.mjskok.com/resource/2013-future-cloud-computing-3rd-annual- survey-results (accessed November 2013)
-
-
-
-
3
-
-
84903157288
-
Cyber Crime Costs Global Economy Up to $500B a Year (July 22, 2013)
-
accessed November 2013
-
FOXBusinessReport, Matt Egan. Cyber Crime Costs Global Economy Up to $500B a Year (July 22, 2013), http://www.foxbusiness.com/technology/2013/ 07/22/report-cyber-crime-costs-global-economy-up-to-1-trillion-year/ (accessed November 2013)
-
FOXBusinessReport
-
-
Egan, M.1
-
5
-
-
85083945093
-
A Road Map for Digital Forensic Research - Report from the First Digital Forensic Research Workshop (DFRWS), Utica, New York, USA, August 2001
-
Technical Report DTR-T001-01
-
Palmer Gary, L.: A Road Map for Digital Forensic Research - report from the First Digital Forensic Research Workshop (DFRWS), Utica, New York, USA, August 2001. Technical Report DTR-T001-01, Digital Forensic Research Workshop, Utica, New York, USA (November 2001)
-
Digital Forensic Research Workshop, Utica, New York, USA (November 2001)
-
-
Palmer Gary, L.1
-
6
-
-
1242273312
-
An examination of digital forensic models
-
Mark, R., Carr, C., Gunsch, G.: An examination of digital forensic models. International Journal of Digital Evidence 1(3), 1-12 (2002)
-
(2002)
International Journal of Digital Evidence
, vol.1
, Issue.3
, pp. 1-12
-
-
Mark, R.1
Carr, C.2
Gunsch, G.3
-
9
-
-
19844379355
-
A hierarchical, objectives-based framework for the digital investigations process
-
Lang, B.N., Clark, J.G.: A hierarchical, objectives-based framework for the digital investigations process. Digital Investigation 2(2), 147-167 (2005)
-
(2005)
Digital Investigation
, vol.2
, Issue.2
, pp. 147-167
-
-
Lang, B.N.1
Clark, J.G.2
-
10
-
-
79851504208
-
Guide to integrating forensic techniques into incident response
-
Kent, K., Chevalier, S., Grance, T., Dang, H.: Guide to integrating forensic techniques into incident response, pp. 800-886. NIST Special Publication (2006)
-
(2006)
NIST Special Publication
, pp. 800-886
-
-
Kent, K.1
Chevalier, S.2
Grance, T.3
Dang, H.4
-
11
-
-
77953047413
-
Mapping process of digital forensic investigation framework
-
Rahayu, S.S., Yusof, R., Sahib, S.: Mapping process of digital forensic investigation framework. International Journal of Computer Science and Network Security 8(10), 163-169 (2008)
-
(2008)
International Journal of Computer Science and Network Security
, vol.8
, Issue.10
, pp. 163-169
-
-
Rahayu, S.S.1
Yusof, R.2
Sahib, S.3
-
12
-
-
84855936254
-
Fundamentals of digital forensic evidence
-
Springer, Heidelberg
-
Cohen, F.B.: Fundamentals of digital forensic evidence. In: Handbook of Information and Communication Security, pp. 789-808. Springer, Heidelberg (2010)
-
(2010)
Handbook of Information and Communication Security
, pp. 789-808
-
-
Cohen, F.B.1
-
15
-
-
84874342980
-
Suggestions to digital forensics in Cloud computing ERA
-
IEEE
-
Chen, G., Du, Y., Qin, P., Du, J.: Suggestions to digital forensics in Cloud computing ERA. In: 2012 3rd IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC). IEEE (2012)
-
(2012)
2012 3rd IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)
-
-
Chen, G.1
Du, Y.2
Qin, P.3
Du, J.4
-
16
-
-
84870243026
-
An integrated conceptual digital forensic framework for cloud computing
-
Ben, M., Choo, K.-K.R.: An integrated conceptual digital forensic framework for cloud computing. Digital Investigation 9(2), 71-80 (2012)
-
(2012)
Digital Investigation
, vol.9
, Issue.2
, pp. 71-80
-
-
Ben, M.1
Choo, K.-K.R.2
-
17
-
-
84866690602
-
Forensics investigation challenges in cloud computing environments
-
IEEE
-
Mohsen, D., Dehghantanha, A., Mahmoud, R., Shamsuddin, S.B.: Forensics investigation challenges in cloud computing environments. In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec). IEEE (2012)
-
(2012)
2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)
-
-
Mohsen, D.1
Dehghantanha, A.2
Mahmoud, R.3
Shamsuddin, S.B.4
-
20
-
-
84944034810
-
Calm Before the Storm: The Challenges of Cloud
-
George, G., Storer, T., Glisson, W.B.: Calm Before the Storm: The Challenges of Cloud. In: Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security, p. 211 (2013)
-
(2013)
Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security
, pp. 211
-
-
George, G.1
Storer, T.2
Glisson, W.B.3
-
21
-
-
84865663006
-
Discussion on the challenges and opportunities of cloud forensics
-
Quirchmayr, G., Basl, J., You, I., Xu, L., Weippl, E. (eds.) CD-ARES 2012. Springer, Heidelberg
-
Poisel, R., Tjoa, S.: Discussion on the challenges and opportunities of cloud forensics. In: Quirchmayr, G., Basl, J., You, I., Xu, L., Weippl, E. (eds.) CD-ARES 2012. LNCS, vol. 7465, pp. 593-608. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7465
, pp. 593-608
-
-
Poisel, R.1
Tjoa, S.2
-
24
-
-
84865637456
-
Cloud forensics: An overview
-
Ruan, K., Carthy, J., Kechadi, T., Crosbie, M.: Cloud forensics: An overview. Advances in Digital Forensics 7, 35-49 (2011)
-
(2011)
Advances in Digital Forensics
, vol.7
, pp. 35-49
-
-
Ruan, K.1
Carthy, J.2
Kechadi, T.3
Crosbie, M.4
-
27
-
-
84874571410
-
Cloud computing: Pros and cons for computer forensic investigations
-
Reilly, D., Wren, C., Berry, T.: Cloud computing: Pros and cons for computer forensic investigations. International Journal Multimedia and Image Processing (IJMIP) 1(1), 26-34 (2011)
-
(2011)
International Journal Multimedia and Image Processing (IJMIP)
, vol.1
, Issue.1
, pp. 26-34
-
-
Reilly, D.1
Wren, C.2
Berry, T.3
|