메뉴 건너뛰기




Volumn 306, Issue , 2009, Pages 17-36

Digital forensic research: The good, the bad and the unaddressed

(1)  Beebe, Nicole a  

a NONE

Author keywords

Digital forensic research; Evaluation; Future research areas

Indexed keywords

COMPUTER CRIME; ELECTRONIC CRIME COUNTERMEASURES;

EID: 84943526145     PISSN: 18684238     EISSN: 1868422X     Source Type: Book Series    
DOI: 10.1007/978-3-642-04155-6_2     Document Type: Conference Paper
Times cited : (126)

References (75)
  • 4
    • 19844379355 scopus 로고    scopus 로고
    • A hierarchical, objectives-based framework for the digital investigations process
    • [4] N. Beebe and J. Clark, A hierarchical, objectives-based framework for the digital investigations process, Digital Investigation, vol. 2(2), pp. 147–167, 2005.
    • (2005) Digital Investigation , vol.2 , Issue.2 , pp. 147-167
    • Beebe, N.1    Clark, J.2
  • 5
    • 77950005794 scopus 로고    scopus 로고
    • Dealing with terabyte data sets in digital investigations
    • M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts
    • [5] N. Beebe and J. Clark, Dealing with terabyte data sets in digital investigations, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 3–16, 2005.
    • (2005) Advances in Digital Forensics , pp. 3-16
    • Beebe, N.1    Clark, J.2
  • 6
    • 34447558146 scopus 로고    scopus 로고
    • Digital forensic text string searching: Improving information retrieval effectiveness by thematically clustering search results
    • [6] N. Beebe and J. Clark, Digital forensic text string searching: Improving information retrieval effectiveness by thematically clustering search results, Digital Investigation, vol. 4(S1), pp. 49–54, 2007.
    • (2007) Digital Investigation , vol.4 , Issue.1 , pp. 49-54
    • Beebe, N.1    Clark, J.2
  • 9
    • 48749097892 scopus 로고    scopus 로고
    • Using the HFS+ journal for deleted file recovery
    • [9] A. Burghardt and A. Feldman, Using the HFS+ journal for deleted file recovery, Digital Investigation, vol. 5(S1), pp. 76–82, 2008.
    • (2008) Digital Investigation , vol.5 , Issue.1 , pp. 76-82
    • Burghardt, A.1    Feldman, A.2
  • 10
    • 36448977981 scopus 로고    scopus 로고
    • Forensic analysis of Xbox consoles
    • P. Craiger and S. Shenoi (Eds.), Springer, Boston, Massachusetts
    • [10] P. Burke and P. Craiger, Forensic analysis of Xbox consoles, in Advances in Digital Forensics III, P. Craiger and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 269–280, 2007.
    • (2007) Advances in Digital Forensics III , pp. 269-280
    • Burke, P.1    Craiger, P.2
  • 11
    • 33751333555 scopus 로고    scopus 로고
    • The Trojan made me do it: A first step in statistical based computer forensics event reconstruction
    • [11] M. Carney and M. Rogers, The Trojan made me do it: A first step in statistical based computer forensics event reconstruction, International Journal of Digital Evidence, vol. 2(4),2004.
    • (2004) International Journal of Digital Evidence , vol.2 , Issue.4
    • Carney, M.1    Rogers, M.2
  • 13
    • 19944394838 scopus 로고    scopus 로고
    • Tracking USB storage: Analysis of Windows artifacts generated by USB storage devices
    • [13] H. Carvey, Tracking USB storage: Analysis of Windows artifacts generated by USB storage devices, Digital Investigation, vol. 2(2), pp. 94–100, 2005.
    • (2005) Digital Investigation , vol.2 , Issue.2 , pp. 94-100
    • Carvey, H.1
  • 15
    • 3042727240 scopus 로고    scopus 로고
    • Error, uncertainty and loss in digital evidence
    • [15] E. Casey, Error, uncertainty and loss in digital evidence, International Journal of Digital Evidence, vol. 1(2), 2002.
    • (2002) International Journal of Digital Evidence , vol.1 , Issue.2
    • Casey, E.1
  • 16
    • 84868531607 scopus 로고    scopus 로고
    • PyFlag – An advanced network forensic framework
    • [16] M. Cohen, PyFlag – An advanced network forensic framework, Digital Investigation, vol. 5(S1), pp. 112–120, 2008.
    • (2008) Digital Investigation , vol.5 , Issue.1 , pp. 112-120
    • Cohen, M.1
  • 17
    • 33845528317 scopus 로고    scopus 로고
    • Recovering digital evidence from Linux systems
    • M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts
    • [17] P. Craiger, Recovering digital evidence from Linux systems, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 233–244, 2005.
    • (2005) Advances in Digital Forensics , pp. 233-244
    • Craiger, P.1
  • 18
    • 34047209313 scopus 로고    scopus 로고
    • Mac OS X forensics
    • M. Olivier and S. Shenoi (Eds.), Springer, Boston, Massachusetts
    • [18] P. Craiger and P. Burke, Mac OS X forensics, in Advances in Digital Forensics II, M. Olivier and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 159–170, 2006.
    • (2006) Advances in Digital Forensics II , pp. 159-170
    • Craiger, P.1    Burke, P.2
  • 19
    • 51149110977 scopus 로고    scopus 로고
    • A virtual digital forensics laboratory
    • I. Ray and S. Shenoi (Eds.), Springer, Boston, Massachusetts
    • [19] P. Craiger, P. Burke, C. Marberry and M. Pollitt, A virtual digital forensics laboratory, in Advances in Digital Forensics IV, I. Ray and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 357–365, 2008.
    • (2008) Advances in Digital Forensics IV , pp. 357-365
    • Craiger, P.1    Burke, P.2    Marberry, C.3    Pollitt, M.4
  • 20
    • 51149085736 scopus 로고    scopus 로고
    • A network-based architecture for storing digital evidence
    • M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts
    • [20] M. Davis, G. Manes and S. Shenoi, A network-based architecture for storing digital evidence, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 33–43, 2005.
    • (2005) Advances in Digital Forensics , pp. 33-43
    • Davis, M.1    Manes, G.2    Shenoi, S.3
  • 21
    • 0042367634 scopus 로고    scopus 로고
    • Mining email content for author identification forensics
    • [21] O. de Vel, A. Anderson, M. Corney and G. Mohay, Mining email content for author identification forensics, ACM SIGMOD Record, vol. 30(4), pp. 55–64, 2001.
    • (2001) ACM SIGMOD Record , vol.30 , Issue.4 , pp. 55-64
    • De Vel, O.1    Anderson, A.2    Corney, M.3    Mohay, G.4
  • 22
    • 84868536266 scopus 로고    scopus 로고
    • An overall assessment of mobile internal acquisition tool
    • [22] A. Distefano and G. Me, An overall assessment of mobile internal acquisition tool, Digital Investigation, vol. 5(S1), pp. 121–127, 2008.
    • (2008) Digital Investigation , vol.5 , Issue.1 , pp. 121-127
    • Distefano, A.1    Me, G.2
  • 23
    • 34447559706 scopus 로고    scopus 로고
    • The VAD tree: A process-eye view of physical memory
    • [23] B. Dolan-Gavitt, The VAD tree: A process-eye view of physical memory, Digital Investigation, vol. 4(S1), pp. 62–64, 2007.
    • (2007) Digital Investigation , vol.4 , Issue.1 , pp. 62-64
    • Dolan-Gavitt, B.1
  • 24
    • 77955345007 scopus 로고    scopus 로고
    • Forensic analysis of theWindows registry in memory
    • [24] B. Dolan-Gavitt, Forensic analysis of theWindows registry in memory, Digital Investigation, vol. 5(S1), pp. 26–32, 2008.
    • (2008) Digital Investigation , vol.5 , Issue.1 , pp. 26-32
    • Dolan-Gavitt, B.1
  • 25
    • 84885884600 scopus 로고    scopus 로고
    • Analyzing the impact of a virtual machine on a host machine
    • V, G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany
    • [25] G. Dorn, C. Marberry, S. Conrad and P. Craiger, Analyzing the impact of a virtual machine on a host machine, in Advances in Digital Forensics V, G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 69–81, 2009.
    • (2009) Advances in Digital Forensics , pp. 69-81
    • Dorn, G.1    Marberry, C.2    Conrad, S.3    Craiger, P.4
  • 28
    • 40849087846 scopus 로고    scopus 로고
    • Persistent systems techniques in forensic acquisition of memory
    • [28] E. Huebner, D. Bem, F. Henskens and M.Wallis, Persistent systems techniques in forensic acquisition of memory, Digital Investigation, vol. 4(3-4), pp. 129–137, 2007.
    • (2007) Digital Investigation , vol.4 , Issue.3-4 , pp. 129-137
    • Huebner, E.1    Bem, D.2    Henskens, F.3
  • 30
    • 19844378246 scopus 로고    scopus 로고
    • An overview and analysis of PDA forensic tools
    • [30] W. Jansen and R. Ayers, An overview and analysis of PDA forensic tools, Digital Investigation, vol. 2(2), pp. 120–132, 2005.
    • (2005) Digital Investigation , vol.2 , Issue.2 , pp. 120-132
    • Jansen, W.1    Ayers, R.2
  • 31
    • 48749093720 scopus 로고    scopus 로고
    • MEGA: A tool for Mac OS X operating system and application forensics
    • [31] R. Joyce, J. Powers and F. Adelstein, MEGA: A tool for Mac OS X operating system and application forensics, Digital Investigation, vol. 5(S1), pp. 83–90, 2008.
    • (2008) Digital Investigation , vol.5 , Issue.1 , pp. 83-90
    • Joyce, R.1    Powers, J.2    Adelstein, F.3
  • 32
    • 19944384890 scopus 로고    scopus 로고
    • Risk sensitive digital evidence collection
    • [32] E. Kenneally and C. Brown, Risk sensitive digital evidence collection, Digital Investigation, vol. 2(2), pp. 101–119, 2005.
    • (2005) Digital Investigation , vol.2 , Issue.2 , pp. 101-119
    • Kenneally, E.1    Brown, C.2
  • 34
    • 33746191665 scopus 로고    scopus 로고
    • Identifying almost identical files using context triggered piecewise hashing
    • [34] J. Kornblum, Identifying almost identical files using context triggered piecewise hashing, Digital Investigation, vol. 3(S1), pp. 91–97, 2006.
    • (2006) Digital Investigation , vol.3 , Issue.1 , pp. 91-97
    • Kornblum, J.1
  • 35
    • 33847398384 scopus 로고    scopus 로고
    • Using every part of the buffalo in Windows memory analysis
    • [35] J. Kornblum, Using every part of the buffalo in Windows memory analysis, Digital Investigation, vol. 4(1), pp. 24–29, 2007.
    • (2007) Digital Investigation , vol.4 , Issue.1 , pp. 24-29
    • Kornblum, J.1
  • 38
    • 34447528956 scopus 로고    scopus 로고
    • Massive threading: Using GPUs to increase the performance of digital forensic tools
    • [38] L. Marziale, G. Richard and V. Roussev, Massive threading: Using GPUs to increase the performance of digital forensic tools, Digital Investigation, vol. 4(S1), pp. 73–81, 2007.
    • (2007) Digital Investigation , vol.4 , Issue.1 , pp. 73-81
    • Marziale, L.1    Richard, G.2    Roussev, V.3
  • 39
    • 14544299158 scopus 로고    scopus 로고
    • A new blind method for detecting novel steganography
    • [39] B. McBride, G. Peterson and S. Gustafson, A new blind method for detecting novel steganography, Digital Investigation, vol. 2(1), pp. 50–70, 2005.
    • (2005) Digital Investigation , vol.2 , Issue.1 , pp. 50-70
    • McBride, B.1    Peterson, G.2    Gustafson, S.3
  • 40
    • 24344482521 scopus 로고    scopus 로고
    • To image a Macintosh
    • [40] K. McDonald, To image a Macintosh, Digital Investigation, vol. 2(3), pp. 175–179, 2005.
    • (2005) Digital Investigation , vol.2 , Issue.3 , pp. 175-179
    • McDonald, K.1
  • 41
    • 10644260350 scopus 로고    scopus 로고
    • Forensic examination of mobile phones
    • [41] B. Mellars, Forensic examination of mobile phones, Digital Investigation, vol. 1(4), pp. 266–272, 2004.
    • (2004) Digital Investigation , vol.1 , Issue.4 , pp. 266-272
    • Mellars, B.1
  • 42
    • 1542492748 scopus 로고    scopus 로고
    • Identifying significant features for network forensic analysis using artificial intelligence techniques
    • [42] S. Mukkamala and A. Sung, Identifying significant features for network forensic analysis using artificial intelligence techniques, International Journal of Digital Evidence, vol. 1(4), 2003.
    • (2003) International Journal of Digital Evidence , vol.1 , Issue.4
    • Mukkamala, S.1    Sung, A.2
  • 43
    • 84943553055 scopus 로고    scopus 로고
    • Net Applications, Aliso Viejo, California (marketshare.hitslink.com), April 9
    • [43] Net Applications, Global Market Share Statistics, Aliso Viejo, California (marketshare.hitslink.com), April 9, 2009.
    • (2009) Global Market Share Statistics
  • 45
    • 85083945093 scopus 로고    scopus 로고
    • DFRWS Technical Report, DTR-T001-01 Final, Air Force Research Laboratory, Rome, New York
    • [46] G. Palmer, A Road Map for Digital Forensic Research, DFRWS Technical Report, DTR-T001-01 Final, Air Force Research Laboratory, Rome, New York, 2001.
    • (2001) A Road Map for Digital Forensic Research
    • Palmer, G.1
  • 47
    • 60649094708 scopus 로고    scopus 로고
    • Data concealment and detection in Microsoft Office 2007 files
    • [48] B. Park, J. Park and S. Lee, Data concealment and detection in Microsoft Office 2007 files, Digital Investigation, vol. 5(3-4), pp. 104–114, 2009.
    • (2009) Digital Investigation , vol.5 , Issue.3-4 , pp. 104-114
    • Park, B.1    Park, J.2    Lee, S.3
  • 48
    • 24344460368 scopus 로고    scopus 로고
    • Methodologies for the use of VMware to boot cloned/mounted subject hard disks
    • [49] M. Penhallurick, Methodologies for the use of VMware to boot cloned/mounted subject hard disks, Digital Investigation, vol. 2(3), pp. 209–222, 2005.
    • (2005) Digital Investigation , vol.2 , Issue.3 , pp. 209-222
    • Penhallurick, M.1
  • 49
    • 33845513524 scopus 로고    scopus 로고
    • Detecting hidden data in EXT2/EXT3 file systems
    • M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts
    • [50] S. Piper, M. Davis, G. Manes and S. Shenoi, Detecting hidden data in EXT2/EXT3 file systems, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 245–256, 2005.
    • (2005) Advances in Digital Forensics , pp. 245-256
    • Piper, S.1    Davis, M.2    Manes, G.3    Shenoi, S.4
  • 51
    • 36448968667 scopus 로고    scopus 로고
    • Detecting steganography using multi-class classification
    • P. Craiger and S. Shenoi (Eds.), Springer, Boston, Massachusetts
    • [52] B. Rodriguez and G. Peterson, Detecting steganography using multi-class classification, in Advances in Digital Forensics III, P. Craiger and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 193–204, 2007.
    • (2007) Advances in Digital Forensics III , pp. 193-204
    • Rodriguez, B.1    Peterson, G.2
  • 52
    • 51149100778 scopus 로고    scopus 로고
    • Fusion of steganalysis systems using Bayesian model averaging
    • I. Ray and S. Shenoi (Eds.), Springer, Boston, Massachusetts
    • [53] B. Rodriguez, G. Peterson and K. Bauer, Fusion of steganalysis systems using Bayesian model averaging, in Advances in Digital Forensics IV, I. Ray and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 345–355, 2008.
    • (2008) Advances in Digital Forensics IV , pp. 345-355
    • Rodriguez, B.1    Peterson, G.2    Bauer, K.3
  • 54
    • 33746014654 scopus 로고    scopus 로고
    • Md5bloom: Forensic file system hashing revisited
    • [55] V. Roussev, Y. Chen, T. Bourg and G. Richard, md5bloom: Forensic file system hashing revisited, Digital Investigation, vol. 3(S1), pp. 82–90, 2006.
    • (2006) Digital Investigation , vol.3 , Issue.1 , pp. 82-90
    • Roussev, V.1    Chen, Y.2    Bourg, T.3    Richard, G.4
  • 55
    • 85083946044 scopus 로고    scopus 로고
    • The case for distributed digital forensics, Proceedings of the Fourth Digital Forensic Research Workshop
    • [56] V. Roussev and G. Richard, Breaking the performance wall: The case for distributed digital forensics, Proceedings of the Fourth Digital Forensic Research Workshop, 2004.
    • (2004) Breaking the Performance Wall
    • Roussev, V.1    Richard, G.2
  • 56
    • 34447525132 scopus 로고    scopus 로고
    • Multi-resolution similarity hashing
    • [57] V. Roussev, G. Richard and L. Marziale, Multi-resolution similarity hashing, Digital Investigation, vol. 4(S1), pp. 105–113, 2007.
    • (2007) Digital Investigation , vol.4 , Issue.1 , pp. 105-113
    • Roussev, V.1    Richard, G.2    Marziale, L.3
  • 57
    • 51149099265 scopus 로고    scopus 로고
    • Class-aware similarity hashing for data classification
    • I. Ray and S. Shenoi (Eds.), Springer, Boston, Massachusetts
    • [58] V. Roussev, G. Richard and L. Marziale, Class-aware similarity hashing for data classification, in Advances in Digital Forensics IV, I. Ray and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 101–113, 2008.
    • (2008) Advances in Digital Forensics IV , pp. 101-113
    • Roussev, V.1    Richard, G.2    Marziale, L.3
  • 58
    • 84943543512 scopus 로고    scopus 로고
    • A cloud computing platform for large-scale forensic computing
    • G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany
    • [59] V. Roussev, L. Wang, G. Richard and L. Marziale, A cloud computing platform for large-scale forensic computing, in Advances in Digital Forensics V, G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 201–214, 2009.
    • (2009) Advances in Digital Forensics V , pp. 201-214
    • Roussev, V.1    Wang, L.2    Richard, G.3    Marziale, L.4
  • 59
    • 33751344349 scopus 로고    scopus 로고
    • Mass image classification
    • [60] P. Sanderson, Mass image classification, Digital Investigation, vol. 3(4), pp. 190–195, 2006.
    • (2006) Digital Investigation , vol.3 , Issue.4 , pp. 190-195
    • Sanderson, P.1
  • 60
    • 51149094568 scopus 로고    scopus 로고
    • Data recovery from Windows CE based handheld devices
    • I. Ray and S. Shenoi (Eds.), Springer, Boston, Massachusetts
    • [61] A. Savoldi and P. Gubian, Data recovery from Windows CE based handheld devices, in Advances in Digital Forensics IV, I. Ray and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 219–230, 2008.
    • (2008) Advances in Digital Forensics IV , pp. 219-230
    • Savoldi, A.1    Gubian, P.2
  • 61
    • 33745993901 scopus 로고    scopus 로고
    • Searching for processes and threads in Microsoft Windows memory dumps
    • [62] A. Schuster, Searching for processes and threads in Microsoft Windows memory dumps, Digital Investigation, vol. 3(S1), pp. 10–16, 2006.
    • (2006) Digital Investigation , vol.3 , Issue.1 , pp. 10-16
    • Schuster, A.1
  • 62
    • 48949095226 scopus 로고    scopus 로고
    • The impact of Microsoft Windows pool allocation strategies on memory forensics
    • [63] A. Schuster, The impact of Microsoft Windows pool allocation strategies on memory forensics, Digital Investigation, vol. 5(S1), pp. 58–64, 2008.
    • (2008) Digital Investigation , vol.5 , Issue.1 , pp. 58-64
    • Schuster, A.1
  • 63
    • 33845532477 scopus 로고    scopus 로고
    • Forensic relative strength scoring: ASCII and entropy scoring
    • [64] M. Shannon, Forensic relative strength scoring: ASCII and entropy scoring, International Journal of Digital Evidence, vol. 2(4), 2004.
    • (2004) International Journal of Digital Evidence , vol.2 , Issue.4
    • Shannon, M.1
  • 68
    • 33847308562 scopus 로고    scopus 로고
    • Tackling the U3 trend with computer forensics
    • [69] A. Spruill and C. Pavan, Tackling the U3 trend with computer forensics, Digital Investigation, vol. 4(1), pp. 7–12, 2007.
    • (2007) Digital Investigation , vol.4 , Issue.1 , pp. 7-12
    • Spruill, A.1    Pavan, C.2
  • 69
    • 33845549148 scopus 로고    scopus 로고
    • Imaging and analysis of GSM SIM cards
    • M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts
    • [70] C. Swenson, G. Manes and S. Shenoi, Imaging and analysis of GSM SIM cards, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 205–216, 2005.
    • (2005) Advances in Digital Forensics , pp. 205-216
    • Swenson, C.1    Manes, G.2    Shenoi, S.3
  • 71
    • 33745970746 scopus 로고    scopus 로고
    • Selective and intelligent imaging using digital evidence bags
    • [72] P. Turner, Selective and intelligent imaging using digital evidence bags, Digital Investigation, vol. 3(S1), pp. 59–64, 2006.
    • (2006) Digital Investigation , vol.3 , Issue.1 , pp. 59-64
    • Turner, P.1
  • 72
    • 48749118027 scopus 로고    scopus 로고
    • Forensic memory analysis: Files mapped in memory
    • [73] R. van Baar, W. Alink and A. van Ballegooij, Forensic memory analysis: Files mapped in memory, Digital Investigation, vol. 5(S1), pp. 52–57, 2008.
    • (2008) Digital Investigation , vol.5 , Issue.1 , pp. 52-57
    • Van Baar, R.1    Alink, W.2    Van Ballegooij, A.3
  • 73
    • 4544350505 scopus 로고    scopus 로고
    • Xbox security issues and forensic recovery methodology (Utilizing Linux)
    • [74] C. Vaughan, Xbox security issues and forensic recovery methodology (utilizing Linux), Digital Investigation, vol. 1(3), pp. 165–172, 2004.
    • (2004) Digital Investigation , vol.1 , Issue.3 , pp. 165-172
    • Vaughan, C.1
  • 74
    • 84943537687 scopus 로고    scopus 로고
    • Hewlett-Packard data warehouse lands in Wal-Mart’s shopping cart
    • August 4
    • [75] M. Weier, Hewlett-Packard data warehouse lands in Wal-Mart’s shopping cart, InformationWeek, August 4, 2007.
    • (2007) Informationweek
    • Weier, M.1
  • 75
    • 33845513107 scopus 로고    scopus 로고
    • Forensic analysis of mobile phone internal memory
    • M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts
    • [76] S. Willassen, Forensic analysis of mobile phone internal memory, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 191–204, 2005.
    • (2005) Advances in Digital Forensics , pp. 191-204
    • Willassen, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.