1. Network Reconnaissance Investigation: A Memory Forensics Approach
2. Mike Burmester, Yvo Desmedt, Rebecca Wright, Alec Yasinsac, et al. 2002. Security or privacy, must we choose?. In Symposium on Critical Infrastructure Protection and the Law.
3. Open Text Corporation. 2023. What is an Insider Threat? https://www.microfocus.com/en-us/what-is/insider-threat.
4. Privacy-respecting digital investigation
5. Waleed Halboob, Muhammad Abulaish, and Khaled S. Alghathbar. 2011. Quaternary privacy-levels preservation in computer forensics investigation process. In 2011 International Conference for Internet Technology and Secured Transactions. IEEE, Emei Mountain, Sichuan Province, China, 777--782.