Author:
Thorpe Sean,Ray Indrajit,Grandison Tyrone,Barbir Abbie,France Robert
Publisher
Springer Berlin Heidelberg
Reference25 articles.
1. Rodgers, M.: The role of criminal profiling in the computer forensics process. Computers & Security 22(4), 292–298 (2003)
2. Rodgers, M., Goubalt–Larrecq, J.: Log auditing through model checking. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia (June 2001)
3. Boyd, C., Forster, P.: Time and date issues in forensic computing a case study. Digital Investigation 1(1), 18–23 (2004)
4. Buchholz, F., Tjaden, B.: A brief study of time. In: Proceedings of the 7th Digital Forensics Workshop, Pittsburg, Pennsylvania, USA (August 2007)
5. Fidge, C.: Logical time in distributed computing systems. Computer 24(1), 28–33 (1991)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献