-
1
-
-
84870756714
-
Cloud forensics: Concepts, issues, and challenges
-
S. Zargari and D. Benford, "Cloud Forensics: Concepts, Issues, and Challenges," in 2012 Third International Conference on Emerging Intelligent Data and Web Technologies, 2012, no. 1999, pp. 236-243.
-
(2012)
2012 Third International Conference on Emerging Intelligent Data and Web Technologies
, Issue.1999
, pp. 236-243
-
-
Zargari, S.1
Benford, D.2
-
2
-
-
84941089783
-
Dropbox, word press used As cloud cover in new APT attacks
-
[Online]. [Accessed: 28-Jan- 2015]
-
K. Higgings, "Dropbox, Word Press Used As Cloud Cover In New APT Attacks," Dark reading, 2013. [Online]. Available: http://www.darkreading.com/attacksbreaches/dropbox-wordpress-used-as-cloud-cover-innew-apt-attacks/d/d-id/1140098? [Accessed: 28-Jan- 2015].
-
(2013)
Dark Reading
-
-
Higgings, K.1
-
3
-
-
84875587046
-
Cloud computing and its implications for cybercrime investigations in Australia
-
Apr.
-
C. Hooper, B. Martini, and K.-K. R. Choo, "Cloud computing and its implications for cybercrime investigations in Australia," Comput. Law Secur. Rev., vol. 29, no. 2, pp. 152-163, Apr. 2013.
-
(2013)
Comput. Law Secur. Rev.
, vol.29
, Issue.2
, pp. 152-163
-
-
Hooper, C.1
Martini, B.2
Choo, K.-K.R.3
-
5
-
-
84885399460
-
Evidence and cloud computing□: The virtual machine introspection approach
-
August
-
R. Poisel, E. Malzer, and S. Tjoa, "Evidence and Cloud Computing□: The Virtual Machine Introspection Approach," J. Wirel. Mob. Networks, Ubiquitous Comput. Dependable Appl., vol. 4, no. August, pp. 135-152, 2012.
-
(2012)
J. Wirel. Mob. Networks, Ubiquitous Comput. Dependable Appl.
, vol.4
, pp. 135-152
-
-
Poisel, R.1
Malzer, E.2
Tjoa, S.3
-
6
-
-
84891060892
-
Digital forensics in the cloud
-
no. October
-
S. Zawoad and R. Hasan, "Digital Forensics in the Cloud," Cross Talk, no. October, pp. 17-20, 2013.
-
(2013)
Cross Talk
, pp. 17-20
-
-
Zawoad, S.1
Hasan, R.2
-
9
-
-
84957103995
-
Cloud computing reference architecture and its forensic implications: A preliminary analysis
-
K. Ruan and J. Carthy, "Cloud Computing Reference Architecture and Its Forensic Implications: A Preliminary Analysis," Digit. Forensics Cyber Crime, pp. 1-21, 2013.
-
(2013)
Digit. Forensics Cyber Crime
, pp. 1-21
-
-
Ruan, K.1
Carthy, J.2
-
10
-
-
84865625452
-
Technical challenges of forensic investigations in cloud computing environments
-
D. Birk, "Technical Challenges of Forensic Investigations in Cloud Computing Environments," Workshop on Cryptography and Security in Clouds, 2011, pp. 1-6.
-
(2011)
Workshop on Cryptography and Security in Clouds
, pp. 1-6
-
-
Birk, D.1
-
13
-
-
84874571410
-
Cloud computing□: Pros and cons for computer forensic investigations
-
D. Reilly, C. Wren, and T. Berry, "Cloud Computing□: Pros and Cons for Computer Forensic Investigations," Int. J. Multimed. Image Process., vol. 1, no. 1, pp. 26-34, 2011.
-
(2011)
Int. J. Multimed. Image Process.
, vol.1
, Issue.1
, pp. 26-34
-
-
Reilly, D.1
Wren, C.2
Berry, T.3
-
15
-
-
84866690602
-
Forensics investigation challenges in cloud computing environments
-
M. Damshenas, A. Dehghantanha, R. Mahmoud, and S. Shamsuddin, "Forensics Investigation Challenges in Cloud Computing Environments," in Cyber Security, Cyber Warfare and Digital Forensic (Cyber Sec), 2012 International Conference on, 2012, pp. 190-194.
-
(2012)
Cyber Security, Cyber Warfare and Digital Forensic (Cyber Sec), 2012 International Conference on
, pp. 190-194
-
-
Damshenas, M.1
Dehghantanha, A.2
Mahmoud, R.3
Shamsuddin, S.4
-
17
-
-
84906307098
-
-
arXiv Prepr. arXiv1302.6312
-
S. Zawoad and R. Hasan, "Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems," arXiv Prepr. arXiv1302.6312, pp. 1-15, 2013.
-
(2013)
Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems
, pp. 1-15
-
-
Zawoad, S.1
Hasan, R.2
-
18
-
-
84868560342
-
Forensic investigations in cloud environments
-
H. Guo, B. Jin, and T. Shang, "Forensic Investigations in Cloud Environments," in 2012 International Conference on Computer Science and Information Processing (CSIP), 2012, pp. 248-251.
-
(2012)
2012 International Conference on Computer Science and Information Processing (CSIP)
, pp. 248-251
-
-
Guo, H.1
Jin, B.2
Shang, T.3
-
19
-
-
84870243026
-
An integrated conceptual digital forensic framework for cloud computing
-
Nov.
-
B. Martini and K.-K. R. Choo, "An integrated conceptual digital forensic framework for cloud computing," Digit. Investig., vol. 9, no. 2, pp. 71-80, Nov. 2012.
-
(2012)
Digit. Investig.
, vol.9
, Issue.2
, pp. 71-80
-
-
Martini, B.1
Choo, K.-K.R.2
-
21
-
-
84881295724
-
Design and implementation of FROST: Digital forensic tools for the open stack cloud computing platform
-
Aug.
-
J. Dykstra and A. T. Sherman, "Design and implementation of FROST: Digital forensic tools for the Open Stack cloud computing platform," Digit. Investig., vol. 10, pp. S87-S95, Aug. 2013.
-
(2013)
Digit. Investig.
, vol.10
, pp. S87-S95
-
-
Dykstra, J.1
Sherman, A.T.2
-
22
-
-
84865637456
-
Cloud forensics□: An overview
-
K. Ruan, J. Carthy, T. Kechadi, and M. Crosbie, "Cloud forensics□: An overview," Adv. Digit. Forensics VII, pp. 15-26, 2011.
-
(2011)
Adv. Digit. Forensics
, vol.7
, pp. 15-26
-
-
Ruan, K.1
Carthy, J.2
Kechadi, T.3
Crosbie, M.4
-
23
-
-
84897016305
-
Digital forensic framework for a cloud environment
-
G. Sibiya, H. S. Venter, and T. Fogwill, "Digital Forensic Framework for a Cloud Environment," IST-Africa 2012 Conference proceedings, 2012, pp. 1-8.
-
(2012)
IST-Africa 2012 Conference Proceedings
, pp. 1-8
-
-
Sibiya, G.1
Venter, H.S.2
Fogwill, T.3
-
24
-
-
79954589576
-
Forensic investigation of cloud computing systems
-
Mar.
-
M. Taylor, J. Haggerty, D. Gresty, and D. Lamb, "Forensic investigation of cloud computing systems," Netw. Secur., vol. 2011, no. 3, pp. 4-10, Mar. 2011.
-
(2011)
Netw. Secur.
, vol.2011
, Issue.3
, pp. 4-10
-
-
Taylor, M.1
Haggerty, J.2
Gresty, D.3
Lamb, D.4
-
25
-
-
84898291010
-
Designing a forensic-enabling cloud ecosystem
-
USA: IGI Global
-
K. Ruan, "Designing a Forensic-Enabling Cloud Ecosystem," in Cybercrime and cloud forensics, USA: IGI Global, 2013, pp. 331-344.
-
(2013)
Cybercrime and Cloud Forensics
, pp. 331-344
-
-
Ruan, K.1
-
26
-
-
84941111698
-
Hack the cloud: Ethical hacking and cloud forensics
-
USA: IGI Global
-
M. Crosbie, "Hack the Cloud: Ethical Hacking and Cloud Forensics," in Cybercrime and cloud forensics, USA: IGI Global, 2013, p. 17.
-
(2013)
Cybercrime and Cloud Forensics
, pp. 17
-
-
Crosbie, M.1
-
27
-
-
84877838084
-
Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results
-
Mar.
-
K. Ruan, J. Carthy, T. Kechadi, and I. Baggili, "Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results," Digit. Investig., vol. 10, no. 1, pp. 34-43, Mar. 2013.
-
(2013)
Digit. Investig.
, vol.10
, Issue.1
, pp. 34-43
-
-
Ruan, K.1
Carthy, J.2
Kechadi, T.3
Baggili, I.4
-
28
-
-
80053414801
-
Trust cloud: A framework for accountability and trust in cloud computing
-
R. K. L. Ko, P. Jagadpramana, M. Mowbray, S. Pearson, M. Kirchberg, Q. Liang, and B. S. Lee, "Trust Cloud: A Framework for Accountability and Trust in Cloud Computing," 2011 IEEE World Congress on Services, 2011, pp. 584-588.
-
(2011)
2011 IEEE World Congress on Services
, pp. 584-588
-
-
Ko, R.K.L.1
Jagadpramana, P.2
Mowbray, M.3
Pearson, S.4
Kirchberg, M.5
Liang, Q.6
Lee, B.S.7
-
29
-
-
84864596423
-
Acquiring forensic evidence from infrastructure-as-A-service cloud computing: Exploring and evaluating tools, trust, and techniques
-
Aug.
-
J. Dykstra and A. T. Sherman, "Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques," Digit. Investig., vol. 9, pp. S90-S98, Aug. 2012.
-
(2012)
Digit. Investig.
, vol.9
, pp. S90-S98
-
-
Dykstra, J.1
Sherman, A.T.2
-
30
-
-
84904009352
-
Isolating a cloud instance for a digital forensic
-
W. Delport, M. S. Olivier, and M. Kohn, "Isolating a Cloud Instance for a Digital Forensic," in ISSA, 2011.
-
(2011)
ISSA
-
-
Delport, W.1
Olivier, M.S.2
Kohn, M.3
-
31
-
-
84941046451
-
Digital provenance: Enabling secure data forensics in cloud computing
-
Oct.
-
J. Li, X. Chen, Q. Huang, and D. S. Wong, "Digital provenance: Enabling secure data forensics in cloud computing," Futur. Gener. Comput. Syst., Oct. 2013.
-
(2013)
Futur. Gener. Comput. Syst.
-
-
Li, J.1
Chen, X.2
Huang, Q.3
Wong, D.S.4
-
35
-
-
84874342980
-
Suggestions to digital forensics in cloud computing ERA
-
G. Chen, Y. Du, P. Qin, and J. Du, "Suggestions to digital forensics in Cloud computing ERA," in 2012 3rd IEEE International Conference on Network Infrastructure and Digital Content, 2012, pp. 540-544.
-
(2012)
2012 3rd IEEE International Conference on Network Infrastructure and Digital Content
, pp. 540-544
-
-
Chen, G.1
Du, Y.2
Qin, P.3
Du, J.4
-
37
-
-
77955574175
-
Digital evidence in cloud computing systems
-
May.
-
M. Taylor, J. Haggerty, D. Gresty, and R. Hegarty, "Digital evidence in cloud computing systems," Comput. Law Secur. Rev., vol. 26, no. 3, pp. 304-308, May 2010.
-
(2010)
Comput. Law Secur. Rev.
, vol.26
, Issue.3
, pp. 304-308
-
-
Taylor, M.1
Haggerty, J.2
Gresty, D.3
Hegarty, R.4
-
38
-
-
84941075486
-
Computer investigations
-
[Online]
-
M. Kumar, "Computer Investigations," The Hacker News, 2011. [Online]. Available: http://thehackernews.com/2011/09/offline-windowsanalysis-and-data.html.
-
(2011)
The Hacker News
-
-
Kumar, M.1
-
39
-
-
84899127115
-
Regenerating cloud attack scenarios using LVM2 based system snapshots for forensic analysis
-
G. Geethakumari and A. Belorkar, "Regenerating Cloud Attack Scenarios using LVM2 based System Snapshots for Forensic Analysis," Int. J. Cloud Comput. Serv. Sci., vol. 1, no. 3, pp. 134-141, 2012.
-
(2012)
Int. J. Cloud Comput. Serv. Sci.
, vol.1
, Issue.3
, pp. 134-141
-
-
Geethakumari, G.1
Belorkar, A.2
-
41
-
-
84857156979
-
Digital forensics for eucalyptus
-
Z. Zaferullah, F. Anwar, and Z. Anwar, "Digital Forensics for Eucalyptus," in 2011 Frontiers of Information Technology, 2011, pp. 110-116.
-
(2011)
2011 Frontiers of Information Technology
, pp. 110-116
-
-
Zaferullah, Z.1
Anwar, F.2
Anwar, Z.3
-
42
-
-
84941122102
-
Cybercrime and cloud forensics
-
K. Ruan, Ed. USA: IGI Global
-
J. Dykstra, "Cybercrime and Cloud Forensics," in Cybercrime and cloud forensics, K. Ruan, Ed. USA: IGI Global, 2013, pp. 156-185.
-
(2013)
Cybercrime and Cloud Forensics
, pp. 156-185
-
-
Dykstra, J.1
|