Subject
Law,Medical Laboratory Technology,Computer Science Applications
Reference20 articles.
1. The Windows Registry as a forensic resource;Carvey;Digital Investigations,2005
2. Tracking USB storage: analysis of windows artifacts generated by USB storage devices;Carvey;Digital Investigation,2005
3. Windows forensic analysis DVD Toolkit 2E;Carvey,2009
4. The risk of disruption or destruction of critical U.S. infrastructure by an offensive cyber attack;DiRenzo,2012
5. Balancing the threat of personal technology in the workplace;Garrity;International Journal of Electronic Security and Digital Forensics,2010
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Digital Forensics in Cyber Security—Recent Trends, Threats, and Opportunities;Cybersecurity Threats with New Perspectives;2021-12-08
2. A proactive malicious software identification approach for digital forensic examiners;Journal of Information Security and Applications;2019-08
3. Forensic signature for tracking storage devices: Analysis of UEFI firmware image, disk signature and windows artifacts;Digital Investigation;2019-06
4. USB SPY: A Stratagem for Tracing USB Storage Devices;2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech);2018-08
5. Program execution analysis in Windows: A study of data sources, their format and comparison of forensic capability;Computers & Security;2018-05