Author:
Bashir Muhammad Shamraiz,Khan Muhammad Naeem Ahmed
Subject
Law,General Computer Science
Reference19 articles.
1. ACPO good practice guide for digital evidence version 5′. ACPO (Association of Chief Police Officer), Metropolitan Police Service, UK, 2012.
2. Malin, CH; Casey, E; Aquilina, JM. ‘Malware forensics: investigating and analysing malicious code’. Syngress, 2008.
3. Bolagh, S; Pondelik, M. ‘Capturing Encryption Keys for Digital Analysis’. In Proceedings 6th International Conference on Intelligent Data Acquisition and Advanced Computing Systems(IDAACS), pp.759–763, Prague, 15–17 September 2011.
4. Dija, S; Balan, C; Anoop, V; Ramani, B. ‘Towards Successful Forensic Recovery of BitLocked Volumes’. In Proceedings 6th International Conference on System of Systems Engineering (SoSE), pp.317-322, Albuquerque, NM, 27-30 June 2011.
5. Chan, E; Venkataraman, S; Gutierrez, A; Campbell, RH. ‘Characterizing Data Structures for Volatile Forensics’. In Proceedings of 11th International Workshop on Systematic Approaches to Digital Forensic Engineering(SADFE), pp.1–9, Washington, DC, US, 2011.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献