-
1
-
-
19844379355
-
A hierarchical, objectives-based framework for the digital investigations process
-
N. Beebe and J. Clark, A hierarchical, objectives-based framework for the digital investigations process, Digital Investigation, vol. 2(2), pp. 147–167, 2005.
-
(2005)
Digital Investigation
, vol.2
, Issue.2
, pp. 147-167
-
-
Beebe, N.1
Clark, J.2
-
2
-
-
51249123658
-
-
Version 3.1, CERT, Software Engineering Institute, Carnegie-Mellon University, Pittsburgh, Pennsylvania
-
D. Cappelli, A. Moore, R. Trzeciak and T. Shimeall, Common Sense Guide to Prevention and Detection of Insider Threats, Version 3.1, CERT, Software Engineering Institute, Carnegie-Mellon University, Pittsburgh, Pennsylvania, 2009.
-
(2009)
Common Sense Guide to Prevention and Detection of Insider Threats
-
-
Cappelli, D.1
Moore, A.2
Trzeciak, R.3
Shimeall, T.4
-
5
-
-
0003615205
-
-
Sandia Report SAND98-8667, Sandia National Laboratories, Albuquerque, New Mexico and Livermore, California
-
J. Howard and T. Longstaff, A Common Language for Computer Security Incidents, Sandia Report SAND98-8667, Sandia National Laboratories, Albuquerque, New Mexico and Livermore, California, 1998.
-
(1998)
A Common Language for Computer Security Incidents
-
-
Howard, J.1
Longstaff, T.2
-
6
-
-
33746255206
-
FORZA: Digital forensics investigation framework that incorporates legal issues
-
R. Ieong, FORZA: Digital forensics investigation framework that incorporates legal issues, Digital Investigation, vol. 3(S1), pp. 29–36, 2006.
-
(2006)
Digital Investigation
, vol.3
, Issue.1
, pp. 29-36
-
-
Ieong, R.1
-
7
-
-
0042584859
-
The principal elements of the nature of science: Dispelling the myths in the nature of science
-
in, W. McComas (Ed.), Kluwer, Dordrecht, The Netherlands
-
W. McComas, The principal elements of the nature of science: Dispelling the myths in the nature of science, in The Nature of Science in Science Education, W. McComas (Ed.), Kluwer, Dordrecht, The Netherlands, pp. 53–70, 1998.
-
(1998)
The Nature of Science in Science Education
, pp. 53-70
-
-
McComas, W.1
-
8
-
-
85083945093
-
-
DFRWS Technical Report DTR–T001-01 Final, Air Force Research Laboratory, Rome, New York
-
G. Palmer, A Road Map for Digital Forensic Research, DFRWS Technical Report DTR–T001-01 Final, Air Force Research Laboratory, Rome, New York (dfrws.org/2001/dfrws-rm-final.pdf), 2001.
-
(2001)
A Road Map for Digital Forensic Research
-
-
Palmer, G.1
-
11
-
-
1242273312
-
An examination of digital forensic models
-
M. Reith, C. Carr and G. Gunsch, An examination of digital forensic models, International Journal of Digital Evidence, vol. 1(3), 2002.
-
(2002)
International Journal of Digital Evidence
, vol.1
, Issue.3
-
-
Reith, M.1
Carr, C.2
Gunsch, G.3
-
12
-
-
77953047413
-
Mapping process of digital forensic investigation framework
-
S. Selamat, R. Yusof and S. Sahib, Mapping process of digital forensic investigation framework, International Journal of Computer Science and Network Security, vol. 8(10), pp. 163–169, 2008.
-
(2008)
International Journal of Computer Science and Network Security
, vol.8
, Issue.10
, pp. 163-169
-
-
Selamat, S.1
Yusof, R.2
Sahib, S.3
-
13
-
-
34249853217
-
-
San Francisco, California
-
J. Sherwood, A. Clark and D. Lynas, Enterprise Security Architecture: A Business Driven Approach, CMP Books, San Francisco, California, 2005.
-
(2005)
Enterprise Security Architecture: A Business Driven Approach, CMP Books
-
-
Sherwood, J.1
Clark, A.2
Lynas, D.3
-
14
-
-
0004141908
-
-
Prentice-Hall, Upper Saddle River, New Jersey
-
A. Tanenbaum, Computer Networks, Prentice-Hall, Upper Saddle River, New Jersey, 2003.
-
(2003)
Computer Networks
-
-
Tanenbaum, A.1
-
15
-
-
80053139570
-
-
Washington, DC
-
U.S. Department of Justice, Digital Forensics Analysis Methodology, Washington, DC (www.justice.gov/criminal/cybercrime/forensics chart.pdf), 2007.
-
(2007)
Digital Forensics Analysis Methodology
-
-
-
16
-
-
0001134191
-
A framework for information systems architecture
-
J. Zachman, A framework for information systems architecture, IBM Systems Journal, vol. 26(3), pp. 276–292, 1987.
-
(1987)
IBM Systems Journal
, vol.26
, Issue.3
, pp. 276-292
-
-
Zachman, J.1
|