Author:
Ibrahim Nurdeen M.,Al-Nemrat Ameer,Jahankhani Hamid,Bashroush Rabih
Publisher
Springer Berlin Heidelberg
Reference12 articles.
1. Wang, S.J.: Measures of retaining digital evidence to prosecute computer-based cyber-crime 29(2), 216–223 (2006)
2. Dashora, K., Tomar, D.S., Rana, J.L.: A practical approach to evidence gathering in Windows environment 5(8), 21–27 (2010)
3. Wang, G., Cannady, J., and Rosenbluth, J.: Foundation of computer forensics: A technology for the fight against cyber-crime 21(2), 119–127 (2005)
4. Abdullah, M.T., Mahmood, R., Ghani, A.A.A., Abdullah, M.Z., Sultan, A.M.S.: Advances in computer forensics 8(2), 215–219 (2008)
5. Sommer, P.: Intrusion detection as evidence 31(23-24), 2477–2487 (1999)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Digital Forensic Artifacts of FIDO2 Passkeys in Windows 11;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30
2. Log Analysis;Introductory Computer Forensics;2018
3. A Closer Look at Syncany Windows and Ubuntu Clients’ Residual Artefacts;Lecture Notes in Computer Science;2016
4. Introducing and Analysis of the Windows 8 Event Log for Forensic Purposes;Computational Forensics;2015