Author:
Al-Fayoumi Mustafa,Al-Fawa’reh Mohammad,Al-Haija Qasem Abu,Alakailah Alaa
Publisher
Springer Nature Singapore
Reference36 articles.
1. Naiqi L, Zhongshan W, Yujie H (2008) Computer forensics research and implementation based on NTFS file system. In: Proceedings—ISECS international colloquium on computing, communication, control, and management, CCCM 2008, vol 1, pp 519–523
2. Poonia AS (2014) Data wiping and anti forensic techniques. Compusoft 3(12):1374–1376
3. Ölvecký M, Gabriška D (2018) Wiping techniques and anti-forensics methods. In: 2018 IEEE 16th international symposium on intelligent systems and informatics (SISY), pp 127–132
4. Miller FP, Vandome AF, McBrewster J (2009) Levenshtein distance: information theory, computer science, string (computer science), string metric, Damerau? Levenshtein distance, spell checker, hamming distance. Alpha Press
5. “blueangel’s ForensicNote—NTFS Log Tracker.” [Online]. Available: https://sites.google.com/site/forensicnote/ntfs-log-tracker. Accessed 18-Sept 2022