Integrated digital forensic process model
Tài liệu tham khảo
Access Data. FTK. Available online at http://accessdata.com/products/computer-forensics/ftk; [last accessed September 2011].
Adelstein, 2006, Live forensics: diagnosing your system without killing it first, Communications of the ACM – Next-generation Cyber Forensics, 49, 63
Baryamureeba, 2004
Beebe, 2004, 147
Beebe, 2009, Digital forensic research: the good, the bad, and the unaddressed, IFIP Advances in Information and Communication Technology, 306, 17, 10.1007/978-3-642-04155-6_2
Carrier, 2003, Getting physical with the digital forensic process, International Journal of Digital Evidence, 2
Carrier, 2004
Carrier, 2004, Defining event reconstruction of digital crime scenes, Journal of Forensic Sciences, 49, 1291, 10.1520/JFS2004127
Carrier, 2006, Categories of digital forensics investigation analysis techniques based on the computer history model, Digital Investigation (Elsevier), 3, 121, 10.1016/j.diin.2006.06.011
Carrier, 2005
Casey, 2000
Casey, 2004
Casey, 2007
Ciardhuáin, 2004, An extended model of cybercrime investigations, International Journal of Digital Evidence, 3
Cohen, 2009
Cohen, 2010, Towards a science of digital forensic evidence examination, vol. 337, 17
Garfinkel, 2010, Digital forensics research: the next 10 years, Digital Investigation, 7, S64, 10.1016/j.diin.2010.05.009
Guidance Software. EnCase forensics V7, http://www.guidancesoftware.com/forensic.htm [accessed September 2011].
Ioeng, 2006, Forza – digital forensic investigation framework incorporate legal issues, Digital Investigation, 29, 10.1016/j.diin.2006.06.004
Köhn, 2008
Kruse, 2002
Lee, 2001
Mylonas, 2012, Smartphone forensics: a proactive investigation scheme for evidence acquisition, vol. 376, 249
Nair, 2006
Noblitt, 2000, Recovering and examining computer forensic evidence, Forensic Science Communications, 2
Palmer, 2001
Patel, 2000, The impact of forensic computing on telecommunications, IEEE Communications Magazine, 64, 10.1109/35.883490
Perumal, 2009, Digital forensic model based on Malaysian investigation process, International Journal of Computer Science and Network Security, 9, 38
Pollitt, 2001, Report on digital forensics
Pollitt, 2010, A history of digital forensics, 3
Robbins J. An explanation of computer forensics. Retrieved 10.02.12, from http://www.pivx.com/forensics.
Rogers, 2006, Computer forensics field triage process model, Journal of Digital Forensics, Security and Law, 1
Rowlingson, 2004, Ten step process for forensic readiness, International Journal of Digital Evidence, 2
Tan, 2001
von Solms, 2006, Control framework for digital forensics, 343, 10.1007/0-387-36891-4_27
Willassen, 2005, Digital forensics research, Telektronikk, 101, 92
Wojcik, 2006, Applying machine trust models to forensic investigations, vol. 222, 55
Wolfe, 2003, Computer forensics, Computers & Security (Elsevier), 22, 26, 10.1016/S0167-4048(03)00105-6
Zachman, 2003