1. F. James Sensenbrenner. 2006. Federal Rules of Civil Procedure. https://www.uscourts.gov/file/19892/download. F. James Sensenbrenner. 2006. Federal Rules of Civil Procedure. https://www.uscourts.gov/file/19892/download.
2. Riadi I. Istiyanto J. E. Ashari A. and Subanar. 2013. Log analysis techniques using clustering in network forensics. International Journal of Computer Science & Information Security 10(7). Riadi I. Istiyanto J. E. Ashari A. and Subanar. 2013. Log analysis techniques using clustering in network forensics. International Journal of Computer Science & Information Security 10(7).
3. Carvey H. 2011. Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry. Syngress Publishing. http://index-of.es/Varios-2/Windows%20Registr-y%20Forensics.pdf. Carvey H. 2011. Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry. Syngress Publishing. http://index-of.es/Varios-2/Windows%20Registr-y%20Forensics.pdf.
4. Beebe N. L. and Liu L.. 2014. Ranki ng algorithms for digital forensic string search hits. Elsevier Science Publishers B. V. DOI= http://doi.acm.org/ 10.1016/j.diin.2014.05.007. Beebe N. L. and Liu L.. 2014. Ranki ng algorithms for digital forensic string search hits. Elsevier Science Publishers B. V. DOI= http://doi.acm.org/ 10.1016/j.diin.2014.05.007.
5. Thematically Clustering In Digital Forensics Text String Searching: A Survey;Nensi Kansagara;International Journal of Advanced Research in Computer Science, 8 (3),2017