-
4
-
-
19844379355
-
A hierarchical, objectives-based framework for the digital investigations process
-
[4] N. Beebe and J. Clark, A hierarchical, objectives-based framework for the digital investigations process, Digital Investigation, vol. 2(2), pp. 147–167, 2005.
-
(2005)
Digital Investigation
, vol.2
, Issue.2
, pp. 147-167
-
-
Beebe, N.1
Clark, J.2
-
5
-
-
77950005794
-
Dealing with terabyte data sets in digital investigations
-
M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts
-
[5] N. Beebe and J. Clark, Dealing with terabyte data sets in digital investigations, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 3–16, 2005.
-
(2005)
Advances in Digital Forensics
, pp. 3-16
-
-
Beebe, N.1
Clark, J.2
-
6
-
-
34447558146
-
Digital forensic text string searching: Improving information retrieval effectiveness by thematically clustering search results
-
[6] N. Beebe and J. Clark, Digital forensic text string searching: Improving information retrieval effectiveness by thematically clustering search results, Digital Investigation, vol. 4(S1), pp. 49–54, 2007.
-
(2007)
Digital Investigation
, vol.4
, Issue.1
, pp. 49-54
-
-
Beebe, N.1
Clark, J.2
-
9
-
-
48749097892
-
Using the HFS+ journal for deleted file recovery
-
[9] A. Burghardt and A. Feldman, Using the HFS+ journal for deleted file recovery, Digital Investigation, vol. 5(S1), pp. 76–82, 2008.
-
(2008)
Digital Investigation
, vol.5
, Issue.1
, pp. 76-82
-
-
Burghardt, A.1
Feldman, A.2
-
10
-
-
36448977981
-
Forensic analysis of Xbox consoles
-
P. Craiger and S. Shenoi (Eds.), Springer, Boston, Massachusetts
-
[10] P. Burke and P. Craiger, Forensic analysis of Xbox consoles, in Advances in Digital Forensics III, P. Craiger and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 269–280, 2007.
-
(2007)
Advances in Digital Forensics III
, pp. 269-280
-
-
Burke, P.1
Craiger, P.2
-
11
-
-
33751333555
-
The Trojan made me do it: A first step in statistical based computer forensics event reconstruction
-
[11] M. Carney and M. Rogers, The Trojan made me do it: A first step in statistical based computer forensics event reconstruction, International Journal of Digital Evidence, vol. 2(4),2004.
-
(2004)
International Journal of Digital Evidence
, vol.2
, Issue.4
-
-
Carney, M.1
Rogers, M.2
-
13
-
-
19944394838
-
Tracking USB storage: Analysis of Windows artifacts generated by USB storage devices
-
[13] H. Carvey, Tracking USB storage: Analysis of Windows artifacts generated by USB storage devices, Digital Investigation, vol. 2(2), pp. 94–100, 2005.
-
(2005)
Digital Investigation
, vol.2
, Issue.2
, pp. 94-100
-
-
Carvey, H.1
-
14
-
-
34548115437
-
Forensics and SIM cards: An overview
-
[14] F. Casadei, A. Savoldi and P. Gubian, Forensics and SIM cards: An overview, International Journal of Digital Evidence, vol. 5(1), 2006.
-
(2006)
International Journal of Digital Evidence
, vol.5
, Issue.1
-
-
Casadei, F.1
Savoldi, A.2
Gubian, P.3
-
15
-
-
3042727240
-
Error, uncertainty and loss in digital evidence
-
[15] E. Casey, Error, uncertainty and loss in digital evidence, International Journal of Digital Evidence, vol. 1(2), 2002.
-
(2002)
International Journal of Digital Evidence
, vol.1
, Issue.2
-
-
Casey, E.1
-
16
-
-
84868531607
-
PyFlag – An advanced network forensic framework
-
[16] M. Cohen, PyFlag – An advanced network forensic framework, Digital Investigation, vol. 5(S1), pp. 112–120, 2008.
-
(2008)
Digital Investigation
, vol.5
, Issue.1
, pp. 112-120
-
-
Cohen, M.1
-
17
-
-
33845528317
-
Recovering digital evidence from Linux systems
-
M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts
-
[17] P. Craiger, Recovering digital evidence from Linux systems, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 233–244, 2005.
-
(2005)
Advances in Digital Forensics
, pp. 233-244
-
-
Craiger, P.1
-
18
-
-
34047209313
-
Mac OS X forensics
-
M. Olivier and S. Shenoi (Eds.), Springer, Boston, Massachusetts
-
[18] P. Craiger and P. Burke, Mac OS X forensics, in Advances in Digital Forensics II, M. Olivier and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 159–170, 2006.
-
(2006)
Advances in Digital Forensics II
, pp. 159-170
-
-
Craiger, P.1
Burke, P.2
-
19
-
-
51149110977
-
A virtual digital forensics laboratory
-
I. Ray and S. Shenoi (Eds.), Springer, Boston, Massachusetts
-
[19] P. Craiger, P. Burke, C. Marberry and M. Pollitt, A virtual digital forensics laboratory, in Advances in Digital Forensics IV, I. Ray and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 357–365, 2008.
-
(2008)
Advances in Digital Forensics IV
, pp. 357-365
-
-
Craiger, P.1
Burke, P.2
Marberry, C.3
Pollitt, M.4
-
20
-
-
51149085736
-
A network-based architecture for storing digital evidence
-
M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts
-
[20] M. Davis, G. Manes and S. Shenoi, A network-based architecture for storing digital evidence, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 33–43, 2005.
-
(2005)
Advances in Digital Forensics
, pp. 33-43
-
-
Davis, M.1
Manes, G.2
Shenoi, S.3
-
21
-
-
0042367634
-
Mining email content for author identification forensics
-
[21] O. de Vel, A. Anderson, M. Corney and G. Mohay, Mining email content for author identification forensics, ACM SIGMOD Record, vol. 30(4), pp. 55–64, 2001.
-
(2001)
ACM SIGMOD Record
, vol.30
, Issue.4
, pp. 55-64
-
-
De Vel, O.1
Anderson, A.2
Corney, M.3
Mohay, G.4
-
22
-
-
84868536266
-
An overall assessment of mobile internal acquisition tool
-
[22] A. Distefano and G. Me, An overall assessment of mobile internal acquisition tool, Digital Investigation, vol. 5(S1), pp. 121–127, 2008.
-
(2008)
Digital Investigation
, vol.5
, Issue.1
, pp. 121-127
-
-
Distefano, A.1
Me, G.2
-
23
-
-
34447559706
-
The VAD tree: A process-eye view of physical memory
-
[23] B. Dolan-Gavitt, The VAD tree: A process-eye view of physical memory, Digital Investigation, vol. 4(S1), pp. 62–64, 2007.
-
(2007)
Digital Investigation
, vol.4
, Issue.1
, pp. 62-64
-
-
Dolan-Gavitt, B.1
-
24
-
-
77955345007
-
Forensic analysis of theWindows registry in memory
-
[24] B. Dolan-Gavitt, Forensic analysis of theWindows registry in memory, Digital Investigation, vol. 5(S1), pp. 26–32, 2008.
-
(2008)
Digital Investigation
, vol.5
, Issue.1
, pp. 26-32
-
-
Dolan-Gavitt, B.1
-
25
-
-
84885884600
-
Analyzing the impact of a virtual machine on a host machine
-
V, G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany
-
[25] G. Dorn, C. Marberry, S. Conrad and P. Craiger, Analyzing the impact of a virtual machine on a host machine, in Advances in Digital Forensics V, G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 69–81, 2009.
-
(2009)
Advances in Digital Forensics
, pp. 69-81
-
-
Dorn, G.1
Marberry, C.2
Conrad, S.3
Craiger, P.4
-
28
-
-
40849087846
-
Persistent systems techniques in forensic acquisition of memory
-
[28] E. Huebner, D. Bem, F. Henskens and M.Wallis, Persistent systems techniques in forensic acquisition of memory, Digital Investigation, vol. 4(3-4), pp. 129–137, 2007.
-
(2007)
Digital Investigation
, vol.4
, Issue.3-4
, pp. 129-137
-
-
Huebner, E.1
Bem, D.2
Henskens, F.3
-
29
-
-
85083947050
-
-
A proposal, Proceedings of the Second Digital Forensic Research Workshop
-
[29] J. Jackson, G. Gunsch, R. Claypoole and G. Lamont, Blind steganography detection using a computational immune system approach: A proposal, Proceedings of the Second Digital Forensic Research Workshop, 2002.
-
(2002)
Blind Steganography Detection Using a Computational Immune System Approach
-
-
Jackson, J.1
Gunsch, G.2
Claypoole, R.3
Lamont, G.4
-
30
-
-
19844378246
-
An overview and analysis of PDA forensic tools
-
[30] W. Jansen and R. Ayers, An overview and analysis of PDA forensic tools, Digital Investigation, vol. 2(2), pp. 120–132, 2005.
-
(2005)
Digital Investigation
, vol.2
, Issue.2
, pp. 120-132
-
-
Jansen, W.1
Ayers, R.2
-
31
-
-
48749093720
-
MEGA: A tool for Mac OS X operating system and application forensics
-
[31] R. Joyce, J. Powers and F. Adelstein, MEGA: A tool for Mac OS X operating system and application forensics, Digital Investigation, vol. 5(S1), pp. 83–90, 2008.
-
(2008)
Digital Investigation
, vol.5
, Issue.1
, pp. 83-90
-
-
Joyce, R.1
Powers, J.2
Adelstein, F.3
-
32
-
-
19944384890
-
Risk sensitive digital evidence collection
-
[32] E. Kenneally and C. Brown, Risk sensitive digital evidence collection, Digital Investigation, vol. 2(2), pp. 101–119, 2005.
-
(2005)
Digital Investigation
, vol.2
, Issue.2
, pp. 101-119
-
-
Kenneally, E.1
Brown, C.2
-
33
-
-
70350048426
-
IPod forensics update
-
[33] M. Kiley, T. Shinbara and M. Rogers, iPod forensics update, International Journal of Digital Evidence, vol. 6(1), 2007.
-
(2007)
International Journal of Digital Evidence
, vol.6
, Issue.1
-
-
Kiley, M.1
Shinbara, T.2
Rogers, M.3
-
34
-
-
33746191665
-
Identifying almost identical files using context triggered piecewise hashing
-
[34] J. Kornblum, Identifying almost identical files using context triggered piecewise hashing, Digital Investigation, vol. 3(S1), pp. 91–97, 2006.
-
(2006)
Digital Investigation
, vol.3
, Issue.1
, pp. 91-97
-
-
Kornblum, J.1
-
35
-
-
33847398384
-
Using every part of the buffalo in Windows memory analysis
-
[35] J. Kornblum, Using every part of the buffalo in Windows memory analysis, Digital Investigation, vol. 4(1), pp. 24–29, 2007.
-
(2007)
Digital Investigation
, vol.4
, Issue.1
, pp. 24-29
-
-
Kornblum, J.1
-
38
-
-
34447528956
-
Massive threading: Using GPUs to increase the performance of digital forensic tools
-
[38] L. Marziale, G. Richard and V. Roussev, Massive threading: Using GPUs to increase the performance of digital forensic tools, Digital Investigation, vol. 4(S1), pp. 73–81, 2007.
-
(2007)
Digital Investigation
, vol.4
, Issue.1
, pp. 73-81
-
-
Marziale, L.1
Richard, G.2
Roussev, V.3
-
39
-
-
14544299158
-
A new blind method for detecting novel steganography
-
[39] B. McBride, G. Peterson and S. Gustafson, A new blind method for detecting novel steganography, Digital Investigation, vol. 2(1), pp. 50–70, 2005.
-
(2005)
Digital Investigation
, vol.2
, Issue.1
, pp. 50-70
-
-
McBride, B.1
Peterson, G.2
Gustafson, S.3
-
40
-
-
24344482521
-
To image a Macintosh
-
[40] K. McDonald, To image a Macintosh, Digital Investigation, vol. 2(3), pp. 175–179, 2005.
-
(2005)
Digital Investigation
, vol.2
, Issue.3
, pp. 175-179
-
-
McDonald, K.1
-
41
-
-
10644260350
-
Forensic examination of mobile phones
-
[41] B. Mellars, Forensic examination of mobile phones, Digital Investigation, vol. 1(4), pp. 266–272, 2004.
-
(2004)
Digital Investigation
, vol.1
, Issue.4
, pp. 266-272
-
-
Mellars, B.1
-
42
-
-
1542492748
-
Identifying significant features for network forensic analysis using artificial intelligence techniques
-
[42] S. Mukkamala and A. Sung, Identifying significant features for network forensic analysis using artificial intelligence techniques, International Journal of Digital Evidence, vol. 1(4), 2003.
-
(2003)
International Journal of Digital Evidence
, vol.1
, Issue.4
-
-
Mukkamala, S.1
Sung, A.2
-
43
-
-
84943553055
-
-
Net Applications, Aliso Viejo, California (marketshare.hitslink.com), April 9
-
[43] Net Applications, Global Market Share Statistics, Aliso Viejo, California (marketshare.hitslink.com), April 9, 2009.
-
(2009)
Global Market Share Statistics
-
-
-
45
-
-
85083945093
-
-
DFRWS Technical Report, DTR-T001-01 Final, Air Force Research Laboratory, Rome, New York
-
[46] G. Palmer, A Road Map for Digital Forensic Research, DFRWS Technical Report, DTR-T001-01 Final, Air Force Research Laboratory, Rome, New York, 2001.
-
(2001)
A Road Map for Digital Forensic Research
-
-
Palmer, G.1
-
47
-
-
60649094708
-
Data concealment and detection in Microsoft Office 2007 files
-
[48] B. Park, J. Park and S. Lee, Data concealment and detection in Microsoft Office 2007 files, Digital Investigation, vol. 5(3-4), pp. 104–114, 2009.
-
(2009)
Digital Investigation
, vol.5
, Issue.3-4
, pp. 104-114
-
-
Park, B.1
Park, J.2
Lee, S.3
-
48
-
-
24344460368
-
Methodologies for the use of VMware to boot cloned/mounted subject hard disks
-
[49] M. Penhallurick, Methodologies for the use of VMware to boot cloned/mounted subject hard disks, Digital Investigation, vol. 2(3), pp. 209–222, 2005.
-
(2005)
Digital Investigation
, vol.2
, Issue.3
, pp. 209-222
-
-
Penhallurick, M.1
-
49
-
-
33845513524
-
Detecting hidden data in EXT2/EXT3 file systems
-
M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts
-
[50] S. Piper, M. Davis, G. Manes and S. Shenoi, Detecting hidden data in EXT2/EXT3 file systems, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 245–256, 2005.
-
(2005)
Advances in Digital Forensics
, pp. 245-256
-
-
Piper, S.1
Davis, M.2
Manes, G.3
Shenoi, S.4
-
50
-
-
46649098260
-
Virtualization and digital forensics: A research and teaching agenda
-
[51] M. Pollitt, K. Nance, B. Hay, R. Dodge, P. Craiger, P. Burke, C. Marberry and B. Brubaker, Virtualization and digital forensics: A research and teaching agenda, Journal of Digital Forensic Practice, vol. 2(2), pp. 62–73, 2008.
-
(2008)
Journal of Digital Forensic Practice
, vol.2
, Issue.2
, pp. 62-73
-
-
Pollitt, M.1
Nance, K.2
Hay, B.3
Dodge, R.4
Craiger, P.5
Burke, P.6
Marberry, C.7
Brubaker, B.8
-
51
-
-
36448968667
-
Detecting steganography using multi-class classification
-
P. Craiger and S. Shenoi (Eds.), Springer, Boston, Massachusetts
-
[52] B. Rodriguez and G. Peterson, Detecting steganography using multi-class classification, in Advances in Digital Forensics III, P. Craiger and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 193–204, 2007.
-
(2007)
Advances in Digital Forensics III
, pp. 193-204
-
-
Rodriguez, B.1
Peterson, G.2
-
52
-
-
51149100778
-
Fusion of steganalysis systems using Bayesian model averaging
-
I. Ray and S. Shenoi (Eds.), Springer, Boston, Massachusetts
-
[53] B. Rodriguez, G. Peterson and K. Bauer, Fusion of steganalysis systems using Bayesian model averaging, in Advances in Digital Forensics IV, I. Ray and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 345–355, 2008.
-
(2008)
Advances in Digital Forensics IV
, pp. 345-355
-
-
Rodriguez, B.1
Peterson, G.2
Bauer, K.3
-
53
-
-
34548126076
-
Steganalysis embedding percentage determination with learning vector quantization
-
[54] B. Rodriguez, G. Peterson, K. Bauer and S. Agaian, Steganalysis embedding percentage determination with learning vector quantization, Proceedings of the IEEE International Conference on Systems Man and Cybernetics, vol. 3, pp. 1861–1865, 2006.
-
(2006)
Proceedings of the IEEE International Conference on Systems Man and Cybernetics
, vol.3
, pp. 1861-1865
-
-
Rodriguez, B.1
Peterson, G.2
Bauer, K.3
Agaian, S.4
-
54
-
-
33746014654
-
Md5bloom: Forensic file system hashing revisited
-
[55] V. Roussev, Y. Chen, T. Bourg and G. Richard, md5bloom: Forensic file system hashing revisited, Digital Investigation, vol. 3(S1), pp. 82–90, 2006.
-
(2006)
Digital Investigation
, vol.3
, Issue.1
, pp. 82-90
-
-
Roussev, V.1
Chen, Y.2
Bourg, T.3
Richard, G.4
-
55
-
-
85083946044
-
-
The case for distributed digital forensics, Proceedings of the Fourth Digital Forensic Research Workshop
-
[56] V. Roussev and G. Richard, Breaking the performance wall: The case for distributed digital forensics, Proceedings of the Fourth Digital Forensic Research Workshop, 2004.
-
(2004)
Breaking the Performance Wall
-
-
Roussev, V.1
Richard, G.2
-
56
-
-
34447525132
-
Multi-resolution similarity hashing
-
[57] V. Roussev, G. Richard and L. Marziale, Multi-resolution similarity hashing, Digital Investigation, vol. 4(S1), pp. 105–113, 2007.
-
(2007)
Digital Investigation
, vol.4
, Issue.1
, pp. 105-113
-
-
Roussev, V.1
Richard, G.2
Marziale, L.3
-
57
-
-
51149099265
-
Class-aware similarity hashing for data classification
-
I. Ray and S. Shenoi (Eds.), Springer, Boston, Massachusetts
-
[58] V. Roussev, G. Richard and L. Marziale, Class-aware similarity hashing for data classification, in Advances in Digital Forensics IV, I. Ray and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 101–113, 2008.
-
(2008)
Advances in Digital Forensics IV
, pp. 101-113
-
-
Roussev, V.1
Richard, G.2
Marziale, L.3
-
58
-
-
84943543512
-
A cloud computing platform for large-scale forensic computing
-
G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany
-
[59] V. Roussev, L. Wang, G. Richard and L. Marziale, A cloud computing platform for large-scale forensic computing, in Advances in Digital Forensics V, G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 201–214, 2009.
-
(2009)
Advances in Digital Forensics V
, pp. 201-214
-
-
Roussev, V.1
Wang, L.2
Richard, G.3
Marziale, L.4
-
59
-
-
33751344349
-
Mass image classification
-
[60] P. Sanderson, Mass image classification, Digital Investigation, vol. 3(4), pp. 190–195, 2006.
-
(2006)
Digital Investigation
, vol.3
, Issue.4
, pp. 190-195
-
-
Sanderson, P.1
-
60
-
-
51149094568
-
Data recovery from Windows CE based handheld devices
-
I. Ray and S. Shenoi (Eds.), Springer, Boston, Massachusetts
-
[61] A. Savoldi and P. Gubian, Data recovery from Windows CE based handheld devices, in Advances in Digital Forensics IV, I. Ray and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 219–230, 2008.
-
(2008)
Advances in Digital Forensics IV
, pp. 219-230
-
-
Savoldi, A.1
Gubian, P.2
-
61
-
-
33745993901
-
Searching for processes and threads in Microsoft Windows memory dumps
-
[62] A. Schuster, Searching for processes and threads in Microsoft Windows memory dumps, Digital Investigation, vol. 3(S1), pp. 10–16, 2006.
-
(2006)
Digital Investigation
, vol.3
, Issue.1
, pp. 10-16
-
-
Schuster, A.1
-
62
-
-
48949095226
-
The impact of Microsoft Windows pool allocation strategies on memory forensics
-
[63] A. Schuster, The impact of Microsoft Windows pool allocation strategies on memory forensics, Digital Investigation, vol. 5(S1), pp. 58–64, 2008.
-
(2008)
Digital Investigation
, vol.5
, Issue.1
, pp. 58-64
-
-
Schuster, A.1
-
63
-
-
33845532477
-
Forensic relative strength scoring: ASCII and entropy scoring
-
[64] M. Shannon, Forensic relative strength scoring: ASCII and entropy scoring, International Journal of Digital Evidence, vol. 2(4), 2004.
-
(2004)
International Journal of Digital Evidence
, vol.2
, Issue.4
-
-
Shannon, M.1
-
64
-
-
84943536695
-
Stego intrusion detection system
-
[65] M. Sieffert, R. Forbes, C. Green, L. Popyack and T. Blake, Stego intrusion detection system, Proceedings of the Fourth Digital Forensic Research Workshop, 2004.
-
(2004)
Proceedings of the Fourth Digital Forensic Research Workshop
-
-
Sieffert, M.1
Forbes, R.2
Green, C.3
Popyack, L.4
Blake, T.5
-
67
-
-
34447517356
-
User data persistence in physical memory
-
[68] J. Solomon, E. Huebner, D. Bem and M. Szezynska, User data persistence in physical memory, Digital Investigation, vol. 4(2), pp. 68–72, 2007.
-
(2007)
Digital Investigation
, vol.4
, Issue.2
, pp. 68-72
-
-
Solomon, J.1
Huebner, E.2
Bem, D.3
Szezynska, M.4
-
68
-
-
33847308562
-
Tackling the U3 trend with computer forensics
-
[69] A. Spruill and C. Pavan, Tackling the U3 trend with computer forensics, Digital Investigation, vol. 4(1), pp. 7–12, 2007.
-
(2007)
Digital Investigation
, vol.4
, Issue.1
, pp. 7-12
-
-
Spruill, A.1
Pavan, C.2
-
69
-
-
33845549148
-
Imaging and analysis of GSM SIM cards
-
M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts
-
[70] C. Swenson, G. Manes and S. Shenoi, Imaging and analysis of GSM SIM cards, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 205–216, 2005.
-
(2005)
Advances in Digital Forensics
, pp. 205-216
-
-
Swenson, C.1
Manes, G.2
Shenoi, S.3
-
71
-
-
33745970746
-
Selective and intelligent imaging using digital evidence bags
-
[72] P. Turner, Selective and intelligent imaging using digital evidence bags, Digital Investigation, vol. 3(S1), pp. 59–64, 2006.
-
(2006)
Digital Investigation
, vol.3
, Issue.1
, pp. 59-64
-
-
Turner, P.1
-
72
-
-
48749118027
-
Forensic memory analysis: Files mapped in memory
-
[73] R. van Baar, W. Alink and A. van Ballegooij, Forensic memory analysis: Files mapped in memory, Digital Investigation, vol. 5(S1), pp. 52–57, 2008.
-
(2008)
Digital Investigation
, vol.5
, Issue.1
, pp. 52-57
-
-
Van Baar, R.1
Alink, W.2
Van Ballegooij, A.3
-
73
-
-
4544350505
-
Xbox security issues and forensic recovery methodology (Utilizing Linux)
-
[74] C. Vaughan, Xbox security issues and forensic recovery methodology (utilizing Linux), Digital Investigation, vol. 1(3), pp. 165–172, 2004.
-
(2004)
Digital Investigation
, vol.1
, Issue.3
, pp. 165-172
-
-
Vaughan, C.1
-
74
-
-
84943537687
-
Hewlett-Packard data warehouse lands in Wal-Mart’s shopping cart
-
August 4
-
[75] M. Weier, Hewlett-Packard data warehouse lands in Wal-Mart’s shopping cart, InformationWeek, August 4, 2007.
-
(2007)
Informationweek
-
-
Weier, M.1
-
75
-
-
33845513107
-
Forensic analysis of mobile phone internal memory
-
M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts
-
[76] S. Willassen, Forensic analysis of mobile phone internal memory, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 191–204, 2005.
-
(2005)
Advances in Digital Forensics
, pp. 191-204
-
-
Willassen, S.1
|