Author:
Shields Clay,Frieder Ophir,Maloof Mark
Subject
Law,Medical Laboratory Technology,Computer Science Applications
Reference40 articles.
1. US v. Ziegler,2007
2. Aggarwal S, Henry P, Kermes L, Mulholland J. Evidence handling in proactive cyberstalking investigations: the PAPA approach. In: Systematic approaches to digital forensic engineering. 2005. p. 165–176.
3. Bishop M. A standard audit trail format. In: National Information Systems Security’95 (18th) proceedings: making security real. 1996. p. 136.
4. Time and date issues in forensic computing: a case Study;Boyd;Digital Investigation,2004
5. Bradford PG, Hu N. A layered approach to insider threat detection and proactive forensics. In: Annual Computer Security Applications Conference (ACSAC). Tuscon, AZ: December 2005.
Cited by
28 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献