메뉴 건너뛰기




Volumn 26, Issue 2, 2009, Pages 59-71

The evolution of file carving

Author keywords

[No Author keywords available]

Indexed keywords

CELLULAR TELEPHONES; DIGITAL DEVICES; TELECOMMUNICATION EQUIPMENT; TELEPHONE SETS;

EID: 85032750978     PISSN: 10535888     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2008.931081     Document Type: Article
Times cited : (131)

References (24)
  • 1
    • 58049122669 scopus 로고    scopus 로고
    • Online, Available
    • Pew Global Attitudes Project [Online]. Available: http:// pewglobal.org/reports/pdf/258.pdf
    • Pew Global Attitudes Project
  • 2
    • 34447513980 scopus 로고    scopus 로고
    • S. Garfinkel, Carving contiguous and fragmented files with fast object validation, in Proc. 2007 Digital Forensics Research Workshop (DFRWS), Pittsburgh, PA, Aug. 2007, pp. 4S:2-12.
    • S. Garfinkel, "Carving contiguous and fragmented files with fast object validation," in Proc. 2007 Digital Forensics Research Workshop (DFRWS), Pittsburgh, PA, Aug. 2007, pp. 4S:2-12.
  • 3
    • 31144464783 scopus 로고    scopus 로고
    • Automated reassembly of file fragmented images using greedy algorithms
    • Feb
    • A. Pal and N. Memon, "Automated reassembly of file fragmented images using greedy algorithms," IEEE Trans. Image Processing, vol. 15, no. 2, pp. 385-393, Feb. 2006.
    • (2006) IEEE Trans. Image Processing , vol.15 , Issue.2 , pp. 385-393
    • Pal, A.1    Memon, N.2
  • 4
    • 65349180057 scopus 로고    scopus 로고
    • Reassembling image fragments
    • Hong Kong, Apr, pp. IV-732-5
    • A. Pal, K. Shanmugasundaram, and N. Memon, "Reassembling image fragments," in Proc. ICASSP, Hong Kong, Apr. 2003, vol. 4, pp. IV-732-5.
    • (2003) Proc. ICASSP , vol.4
    • Pal, A.1    Shanmugasundaram, K.2    Memon, N.3
  • 5
    • 80052885943 scopus 로고    scopus 로고
    • Detecting file fragmentation point using sequential hypothesis testing
    • to be published
    • A. Pal, T. Sencar, and N. Memon, "Detecting file fragmentation point using sequential hypothesis testing," Digit. Investig., to be published.
    • Digit. Investig
    • Pal, A.1    Sencar, T.2    Memon, N.3
  • 7
    • 85032753666 scopus 로고    scopus 로고
    • Online, Available
    • Foremost 1.53 [Online]. Available: http://foremost.sourceforge.net
    • Foremost 1.53
  • 8
    • 0141693090 scopus 로고    scopus 로고
    • Automatic reassembly of document fragments via data compression
    • presented at the, Syracuse, NY, July
    • K. Shanmugasundaram and N. Memon, "Automatic reassembly of document fragments via data compression," presented at the 2nd Digital Forensics Research Workshop, Syracuse, NY, July 2002.
    • (2002) 2nd Digital Forensics Research Workshop
    • Shanmugasundaram, K.1    Memon, N.2
  • 9
    • 35048885009 scopus 로고    scopus 로고
    • Anomalous payload-based network intrusion detection
    • Recent Advances in Intrusion Detection, New York: Springer-Verlag
    • K. Wang, S. Stolfo, "Anomalous payload-based network intrusion detection," in Recent Advances in Intrusion Detection, ( Lecture Notes in Computer Science), vol. 3224. New York: Springer-Verlag, 2004, pp. 203-222.
    • (2004) Lecture Notes in Computer Science , vol.3224 , pp. 203-222
    • Wang, K.1    Stolfo, S.2
  • 11
    • 84969524602 scopus 로고    scopus 로고
    • M. McDaniel and M. Heydari, Content based file type detection algorithms, in Proc. 36th Annu. Hawaii Int. Conf. System Sciences (HICSS'03) - Track 9, IEEE Computer Society, Washington, D.C., 2003, p. 332.1
    • M. McDaniel and M. Heydari, "Content based file type detection algorithms," in Proc. 36th Annu. Hawaii Int. Conf. System Sciences (HICSS'03) - Track 9, IEEE Computer Society, Washington, D.C., 2003, p. 332.1
  • 12
    • 28844486805 scopus 로고    scopus 로고
    • Boston, MA: Pearson Education, Addison-Wesley Professional
    • B. Carrier, File System Forensic Analysis. Boston, MA: Pearson Education, Addison-Wesley Professional, 2005.
    • (2005) File System Forensic Analysis
    • Carrier, B.1
  • 14
    • 33845952188 scopus 로고    scopus 로고
    • File type identification of data fragments by their binary structure
    • June
    • M. Karresand and N. Shahmehri, "File type identification of data fragments by their binary structure," in Proc. IEEE Information Assurance Workshop, June 2006, pp. 140-147.
    • (2006) Proc. IEEE Information Assurance Workshop , pp. 140-147
    • Karresand, M.1    Shahmehri, N.2
  • 18
    • 85032754182 scopus 로고    scopus 로고
    • Online, Available
    • Amiga Smart Filesystem [Online]. Available: http://www.xs4all.nl/hjohn/ SFS
    • Amiga Smart Filesystem
  • 19
    • 34147120474 scopus 로고
    • A note on two problems in connexion with graphs
    • E. W. Dijkstra, "A note on two problems in connexion with graphs," Numerische Mathematik, vol. 1, pp. 269-271, 1959.
    • (1959) Numerische Mathematik , vol.1 , pp. 269-271
    • Dijkstra, E.W.1
  • 20
    • 0005142437 scopus 로고
    • Extent-like performance from a UNIX file system
    • Dallas, TX
    • L.W. McVoy and S.R. Kleiman, "Extent-like performance from a UNIX file system," in Proc. USENIX, Winter '91, Dallas, TX, 1991, pp. 33-43.
    • (1991) Proc. USENIX, Winter '91 , pp. 33-43
    • McVoy, L.W.1    Kleiman, S.R.2
  • 24
    • 0003081845 scopus 로고    scopus 로고
    • Unbounded length context for
    • J. G. Cleary and W. J. Teahan, "Unbounded length context for ppm," Comput. J., vol. 40, no. 2/3, pp. 67-75, 1997.
    • (1997) Comput. J , vol.40 , Issue.2-3 , pp. 67-75
    • Cleary, J.G.1    Teahan, W.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.