Forensic implications of System Resource Usage Monitor (SRUM) data in Windows 8
Tài liệu tham khảo
Atkinson, 2013
Carvey, 2014
Chivers, 2011, Forensic data recovery from the windows search, Digit Investig, 7, 114, 10.1016/j.diin.2011.01.001
Gear, 2013
Kessler, 2007, Anti-forensics and the digital investigator
Malin, 2012
Metz, 2012
Microsoft, 2008
Microsoft, 2009
Microsoft, 2012
Microsoft, 2012
Microsoft, Application lifecycle (Windows Runtime apps). Retrieved 10 4, 2013, from http://msdn.microsoft.com/en-in/library/windows/apps/hh464925.aspx.
Microsoft, Meet Windows Store Apps. Retrieved 06 5, 2013, from http://msdn.microsoft.com/en-in/windows/apps/hh974576.aspx.
Microsoft, Metered Internet connections: FAQ. Retrieved 10 04, 2013, from http://windows.microsoft.com/en-IN/windows-8/metered-internet-connections-frequently-asked-questions.
Microsoft, Security Identifiers. Retrieved 10 3, 2013, from MSDN: http://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx.
Microsoft, NET_LUID union. Retrieved 10 1, 2014, from MSDN: http://msdn.microsoft.com/en-us/library/windows/desktop/aa366320(v=vs.85).aspx.
Piriform Ltd., CCleaner – PC Optimization and Cleaning. Retrieved 1 4, 2014, from http://www.piriform.com/ccleaner.
Russinovich, 2013
Smith, 2013
Sofer, 2010
Sofer, 2013
Cybertron Software Co., Ltd. (n.d.). Privacy Eraser Pro. Retrieved 10 4, 2013, from http://www.privacyeraser.com/.
Wade, 2010