Author:
Shosha Ahmed F.,James Joshua I.,Gladyshev Pavel
Publisher
Springer Berlin Heidelberg
Reference18 articles.
1. Symantec. Internet Security Threat Report, vol. 16 (2010)
2. Gladyshev, P., Patel, A.: Formalizing Event Time Bounding in Digital Investigations. International Journal of Digital Evidence 4(2) (2005)
3. Zhu, Y., James, J., Gladyshev, P.: A comparative methodology for the reconstruction of digital events using Windows Restore Points. Paper Presented at the Digital Investigation Conference (2009)
4. Microsoft. About System Restore (2010), http://msdn.microsoft.com/en-us/library/aa378724(v=vs.85).aspx (retrieved 2011)
5. Harms, K.: Forensic analysis of System Restore points in Microsoft Windows XP. Digital Investigation 3, 151–158 (2006)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Towards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation Purposes;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2013