Integrated digital forensic process model

Computers & Security - Tập 38 - Trang 103-115 - 2013
M.D. Kohn1, M.M. Eloff2, J.H.P. Eloff1,3
1Department of Computer Science, University of Pretoria, Lynnwood Road, Pretoria 0001, South Africa
2Institute for Corporate Citizenship, Unisa, PO Box 392, Pretoria 0003, South Africa
3SAP New Business and Technology (Mobile Empowerment) Africa, Suite 173, Private Bag X 25, Lynnwood Ridge 0040, South Africa

Tài liệu tham khảo

Access Data. FTK. Available online at http://accessdata.com/products/computer-forensics/ftk; [last accessed September 2011]. Adelstein, 2006, Live forensics: diagnosing your system without killing it first, Communications of the ACM – Next-generation Cyber Forensics, 49, 63 Baryamureeba, 2004 Beebe, 2004, 147 Beebe, 2009, Digital forensic research: the good, the bad, and the unaddressed, IFIP Advances in Information and Communication Technology, 306, 17, 10.1007/978-3-642-04155-6_2 Carrier, 2003, Getting physical with the digital forensic process, International Journal of Digital Evidence, 2 Carrier, 2004 Carrier, 2004, Defining event reconstruction of digital crime scenes, Journal of Forensic Sciences, 49, 1291, 10.1520/JFS2004127 Carrier, 2006, Categories of digital forensics investigation analysis techniques based on the computer history model, Digital Investigation (Elsevier), 3, 121, 10.1016/j.diin.2006.06.011 Carrier, 2005 Casey, 2000 Casey, 2004 Casey, 2007 Ciardhuáin, 2004, An extended model of cybercrime investigations, International Journal of Digital Evidence, 3 Cohen, 2009 Cohen, 2010, Towards a science of digital forensic evidence examination, vol. 337, 17 Garfinkel, 2010, Digital forensics research: the next 10 years, Digital Investigation, 7, S64, 10.1016/j.diin.2010.05.009 Guidance Software. EnCase forensics V7, http://www.guidancesoftware.com/forensic.htm [accessed September 2011]. Ioeng, 2006, Forza – digital forensic investigation framework incorporate legal issues, Digital Investigation, 29, 10.1016/j.diin.2006.06.004 Köhn, 2008 Kruse, 2002 Lee, 2001 Mylonas, 2012, Smartphone forensics: a proactive investigation scheme for evidence acquisition, vol. 376, 249 Nair, 2006 Noblitt, 2000, Recovering and examining computer forensic evidence, Forensic Science Communications, 2 Palmer, 2001 Patel, 2000, The impact of forensic computing on telecommunications, IEEE Communications Magazine, 64, 10.1109/35.883490 Perumal, 2009, Digital forensic model based on Malaysian investigation process, International Journal of Computer Science and Network Security, 9, 38 Pollitt, 2001, Report on digital forensics Pollitt, 2010, A history of digital forensics, 3 Robbins J. An explanation of computer forensics. Retrieved 10.02.12, from http://www.pivx.com/forensics. Rogers, 2006, Computer forensics field triage process model, Journal of Digital Forensics, Security and Law, 1 Rowlingson, 2004, Ten step process for forensic readiness, International Journal of Digital Evidence, 2 Tan, 2001 von Solms, 2006, Control framework for digital forensics, 343, 10.1007/0-387-36891-4_27 Willassen, 2005, Digital forensics research, Telektronikk, 101, 92 Wojcik, 2006, Applying machine trust models to forensic investigations, vol. 222, 55 Wolfe, 2003, Computer forensics, Computers & Security (Elsevier), 22, 26, 10.1016/S0167-4048(03)00105-6 Zachman, 2003