1. Wang, K., Stolfo, S.: Anomalous payload-based network intrusion detection. In E. Jonsson el al., ed.: Recent Advances in Intrusion Detection 2004. Volume 3224 of LNCS., Springer-Verlag (2004) 203–222
2. CONVAR Deutschland: Pc inspector. (http://www.pcinspector.de/file_recovery/uk/welcome.htm) accessed 2005-10-31.
3. Carrier, B.: The Sleuth Kit. (http://www.sleuthkit.org/sleuthkit/index.php) accessed 2005-10-25.
4. Farmer, D., Venema, W.: The Coroner’s Toolkit (TCT). (http://www.porcupine.org/forensics/tct.html) accessed 2005-10-25.
5. Guidance Software: Encase forensic. (http://www.guidancesoftware.com/products/ef_index.asp) accessed 2005-10-31.