Publisher
Springer Nature Switzerland
Reference25 articles.
1. Bjørner, N., de Moura, L., Nachmanson, L., Wintersteiger, C.M.: Programming Z3, pp. 148–201. Springer, Cham (2019)
2. Casey, E., Nikkel, B.: Forensic Analysis as Iterative Learning. In: Keupp, M. (ed.) The Security of Critical Infrastructures, pp. 177–192. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-41826-7_11
3. CESG: Good Practice Guide No. 18: Forensic Readiness. Guideline, National Technical Authority for Information Assurance, United Kingdom (2015)
4. Daubner, L., Macak, M., Matulevic̆ius, R., Buhnova, B., Maksović, S., Pitner, T.: Addressing insider attacks via forensic-ready risk management. J. Inf. Secur. Appl. 73, 103433 (2023)
5. Daubner, L., Matulevičius, R., Buhnova, B.: A model of qualitative factors in forensic-ready software systems. In: Nurcan, S., Opdahl, A.L., Mouratidis, H., Tsohou, A. (eds.) RCIS 2023, pp. 308–324. Springer, Cham (2023). https://doi.org/10.1007/978-3-031-33080-3_19