Author:
James Joshua Isaac,Gladyshev Pavel,Zhu Yuandong
Publisher
Springer Berlin Heidelberg
Reference17 articles.
1. Gladyshev, P., Patel, A.: Formalising Event Time Bounding in Digital Investigations. International Journal of Digital Evidence 4 (2005)
2. Haggerty, J., Taylor, M.: FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints. In: IFIP International Federation for Information Processing, vol. 232, pp. 1–12 (2007)
3. James, J.: Survey of Evidence and Forensic Tool Usage in Digital Investigations (July 23, 2010), The UCD Centre for Cybercrime Investigation,
http://cci.ucd.ie/content/survey-evidence-and-forensic-tool-usage-digital-investigations
(July 26, 2010)
4. Kahvedzic, D., Kechadi, T.: Extraction of user activity through comparison of windows restore points. In: 6th Australian Digital Forensics Conference (2008)
5. Kim, D.H., In, D.H.: Cyber Criminal Activity Analysis Models using Markov Chain for Digital Forensics. In: ISA, pp. 193–198 (2008)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献