-
4
-
-
77950347409
-
A view of cloud computing
-
M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, A. Konwinski, and et al. A view of cloud computing Commun ACM 53 4 2010 50 58 10.1145/1721654.1721672
-
(2010)
Commun ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
-
5
-
-
68649121643
-
A second generation computer forensic analysis system
-
D. Ayers A second generation computer forensic analysis system, Digit Investig 6 2009 S34 S42 10.1016/j.diin.2009.06.013
-
(2009)
Digit Investig
, vol.6
, pp. S34-S42
-
-
Ayers, D.1
-
7
-
-
84870254143
-
Engineering an online computer forensic service
-
R.A.F. Bhoedjang, A.R. van Ballegooij, H.M.A. van Beek, J.C. van Schie, F.W. Dillema, R.B. van Baar, and et al. Engineering an online computer forensic service Digit Investig 9 2 2012 96 108 10.1016/j.diin.2012.10.001
-
(2012)
Digit Investig
, vol.9
, Issue.2
, pp. 96-108
-
-
Bhoedjang, R.A.F.1
Van Ballegooij, A.R.2
Van Beek, H.M.A.3
Van Schie, J.C.4
Dillema, F.W.5
Van Baar, R.B.6
-
9
-
-
68649107328
-
Extending the advanced forensic format to accommodate multiple data sources, logical evidence, arbitrary information and forensic workflow
-
the Proceedings of the Ninth Annual DFRWS Conference http://www.sciencedirect.com/science/article/pii/S1742287609000401 URL
-
M. Cohen, S. Garfinkel, and B. Schatz Extending the advanced forensic format to accommodate multiple data sources, logical evidence, arbitrary information and forensic workflow Digit Investig 6 Suppl. 0 2009 S57 S68 the Proceedings of the Ninth Annual DFRWS Conference http://dx.doi.org/10.1016/j.diin.2009.06.010 http://www.sciencedirect.com/science/article/pii/S1742287609000401 URL
-
(2009)
Digit Investig
, vol.6
, pp. S57-S68
-
-
Cohen, M.1
Garfinkel, S.2
Schatz, B.3
-
10
-
-
84868544254
-
Distributed forensics and incident response in the enterprise
-
M. Cohen, D. Bilby, and G. Caronni Distributed forensics and incident response in the enterprise Digit Investig 8 2011 S101 S110
-
(2011)
Digit Investig
, vol.8
, pp. S101-S110
-
-
Cohen, M.1
Bilby, D.2
Caronni, G.3
-
11
-
-
84924180102
-
A scalable file based data store for forensic analysis
-
DFRWS 2015 Europe Proceedings of the Second Annual DFRWS Europe. doi http://www.sciencedirect.com/science/article/pii/S1742287615000171 URL
-
F. Cruz, A. Moser, and M. Cohen A scalable file based data store for forensic analysis Digit Investig 12 Suppl. 1 2015 S90 S101 DFRWS 2015 Europe Proceedings of the Second Annual DFRWS Europe. doi http://dx.doi.org/10.1016/j.diin.2015.01.016 http://www.sciencedirect.com/science/article/pii/S1742287615000171 URL
-
(2015)
Digit Investig
, vol.12
, pp. S90-S101
-
-
Cruz, F.1
Moser, A.2
Cohen, M.3
-
12
-
-
37549003336
-
Mapreduce: Simplified data processing on large clusters
-
J. Dean, and S. Ghemawat Mapreduce: simplified data processing on large clusters Commun ACM 51 1 2008 107 113 10.1145/1327452.1327492
-
(2008)
Commun ACM
, vol.51
, Issue.1
, pp. 107-113
-
-
Dean, J.1
Ghemawat, S.2
-
13
-
-
0017018484
-
New directions in cryptography
-
URL
-
W. Diffie, and M. Hellman New directions in cryptography IEEE Trans Inf Theory 22 6 2006 644 654 10.1109/TIT.1976.1055638 URL http://dx.doi.org/10.1109/TIT.1976.1055638
-
(2006)
IEEE Trans Inf Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
18
-
-
84876535366
-
Digital media triage with bulk data analysis and bulk-extractor
-
S.L. Garfinkel Digital media triage with bulk data analysis and bulk-extractor Comput Secur 32 2013 56 72
-
(2013)
Comput Secur
, vol.32
, pp. 56-72
-
-
Garfinkel, S.L.1
-
22
-
-
84899658909
-
Closing the case: Solving violent crimes quickly and efficiently with public records
-
URL
-
T. Joyce Closing the case: solving violent crimes quickly and efficiently with public records Police Chief 79 2012 50 56 URL http://www.policechiefmagazine.org/magazine/index.cfm?fuseaction=display-arch&article-id=2604&issue-id=22012
-
(2012)
Police Chief
, vol.79
, pp. 50-56
-
-
Joyce, T.1
-
23
-
-
84883559428
-
Integrated digital forensic process model
-
Cybercrime in the Digital Economy
-
M. Kohn, M. Eloff, and J. Eloff Integrated digital forensic process model Comput Secur 38 0 2013 103 115 10.1016/j.cose.2013.05.001 Cybercrime in the Digital Economy
-
(2013)
Comput Secur
, vol.38
, pp. 103-115
-
-
Kohn, M.1
Eloff, M.2
Eloff, J.3
-
24
-
-
28044438199
-
Inventing the future - The vision of the jericho forum
-
URL
-
D. Lacey Inventing the future - the vision of the jericho forum Inf Secur Tech Rep 10 4 2005 186 188 10.1016/j.istr.2005.10.003 URL http://dx.doi.org/10.1016/j.istr.2005.10.003
-
(2005)
Inf Secur Tech Rep
, vol.10
, Issue.4
, pp. 186-188
-
-
Lacey, D.1
-
25
-
-
84858719292
-
Protecting digital data privacy in computer forensic examination
-
F.Y. Law, P.P. Chan, S.-M. Yiu, K.-P. Chow, M.Y. Kwan, H.K. Tse, and et al. Protecting digital data privacy in computer forensic examination Systematic Approaches to Digital Forensic Engineering (SADFE), 2011 IEEE Sixth International Workshop on, IEEE 2011 1 6
-
(2011)
Systematic Approaches to Digital Forensic Engineering (SADFE), 2011 IEEE Sixth International Workshop On, IEEE
, pp. 1-6
-
-
Law, F.Y.1
Chan, P.P.2
Yiu, S.-M.3
Chow, K.-P.4
Kwan, M.Y.5
Tse, H.K.6
-
26
-
-
84872415250
-
Digital forensics as a service: A case study of forensic indexed search
-
J. Lee, and S. Un Digital forensics as a service: a case study of forensic indexed search ICT Convergence (ICTC), International Conference on, 2012 2012 499 503 10.1109/ICTC.2012.6387185
-
(2012)
ICT Convergence (ICTC), International Conference On, 2012
, pp. 499-503
-
-
Lee, J.1
Un, S.2
-
29
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
URL
-
B.C. Neuman, and T. Ts'o Kerberos: an authentication service for computer networks Comm Mag 32 9 1994 33 38 10.1109/35.312841 URL http://dx.doi.org/10.1109/35.312841
-
(1994)
Comm Mag
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.C.1
Ts'O, T.2
-
30
-
-
84949740419
-
Kerckhoffs' principle
-
H.C.A. van Tilborg, S. Jajodia, 2nd ed. Springer URL
-
F.A.P. Petitcolas Kerckhoffs' principle H.C.A. van Tilborg, S. Jajodia, Encyclopedia of cryptography and security 2nd ed. 2011 Springer 675 URL http://dblp.uni-trier.de/db/reference/crypt/crypt2011.html#Petitcolas11
-
(2011)
Encyclopedia of Cryptography and Security
, pp. 675
-
-
Petitcolas, F.A.P.1
-
31
-
-
84916888408
-
Impacts of increasing volume of digital forensic data: A survey and future research challenges
-
http://www.sciencedirect.com/science/article/pii/S1742287614001066 URL
-
D. Quick, and K.-K.R. Choo Impacts of increasing volume of digital forensic data: a survey and future research challenges Digit Investig 11 4 2014 273 294 http://dx.doi.org/10.1016/j.diin.2014.09.002 http://www.sciencedirect.com/science/article/pii/S1742287614001066 URL
-
(2014)
Digit Investig
, vol.11
, Issue.4
, pp. 273-294
-
-
Quick, D.1
Choo, K.-K.R.2
-
33
-
-
84883559090
-
Real-time digital forensics and triage.
-
URL
-
V. Roussev, C. Quates, and R. Martell Real-time digital forensics and triage. Digit Investig 10 2 2013 158 167 URL http://dblp.uni-trier.de/db/journals/di/di10.html#RoussevQM13
-
(2013)
Digit Investig
, vol.10
, Issue.2
, pp. 158-167
-
-
Roussev, V.1
Quates, C.2
Martell, R.3
-
35
-
-
77957838299
-
The hadoop distributed file system
-
IEEE Computer Society Washington, DC, USA URL
-
K. Shvachko, H. Kuang, S. Radia, and R. Chansler The hadoop distributed file system Proceedings of the 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), MSST'10 2010 IEEE Computer Society Washington, DC, USA 1 10 URL http://dx.doi.org/10.1109/MSST.2010.5496972
-
(2010)
Proceedings of the 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), MSST'10
, pp. 1-10
-
-
Shvachko, K.1
Kuang, H.2
Radia, S.3
Chansler, R.4
-
36
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
D.X. Song, D. Wagner, and A. Perrig Practical techniques for searches on encrypted data Security and Privacy, 2000. S&P 2000. Proceedings. 2000 IEEE Symposium on, IEEE 2000 44 55
-
(2000)
Security and Privacy, 2000. S&P 2000. Proceedings. 2000 IEEE Symposium On, IEEE
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
41
-
-
84899626510
-
Digital forensics as a service: A game changer
-
proceedings of the First Annual DFRWS Europe http://www.sciencedirect.com/science/article/pii/S1742287614000127 URL
-
R. van Baar, H. van Beek, and E. van Eijk Digital forensics as a service: a game changer Digit Investig 11 Suppl. 1 2014 S54 S62 proceedings of the First Annual DFRWS Europe http://dx.doi.org/10.1016/j.diin.2014.03.007 http://www.sciencedirect.com/science/article/pii/S1742287614000127 URL
-
(2014)
Digit Investig
, vol.11
, pp. S54-S62
-
-
Van Baar, R.1
Van Beek, H.2
Van Eijk, E.3
-
42
-
-
84924153359
-
Forensics-as-a-service (FaaS): Computer forensic workflow management and processing using cloud
-
Y. Wen, X. Man, K. Le, and W. Shi Forensics-as-a-service (FaaS): computer forensic workflow management and processing using cloud Cloud computing 2013, The Fourth International Conference on Cloud Computing, GRIDs, and Virtualization 2013 208 214
-
(2013)
Cloud Computing 2013, the Fourth International Conference on Cloud Computing, GRIDs, and Virtualization
, pp. 208-214
-
-
Wen, Y.1
Man, X.2
Le, K.3
Shi, W.4
-
44
-
-
84878574973
-
Baf and fi-baf: Efficient and publicly verifiable cryptographic schemes for secure logging in resource-constrained systems
-
A.A. Yavuz, P. Ning, and M.K. Reiter Baf and fi-baf: efficient and publicly verifiable cryptographic schemes for secure logging in resource-constrained systems ACM Trans Inf Syst Secur (TISSEC) 15 2 2012 9
-
(2012)
ACM Trans Inf Syst Secur (TISSEC)
, vol.15
, Issue.2
, pp. 9
-
-
Yavuz, A.A.1
Ning, P.2
Reiter, M.K.3
-
45
-
-
84865827663
-
Efficient, compromise resilient and append-only cryptographic schemes for secure audit logging
-
Springer
-
A.A. Yavuz, P. Ning, and M.K. Reiter Efficient, compromise resilient and append-only cryptographic schemes for secure audit logging Financial cryptography and data security 2012 Springer 148 163
-
(2012)
Financial Cryptography and Data Security
, pp. 148-163
-
-
Yavuz, A.A.1
Ning, P.2
Reiter, M.K.3
|