Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...
Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...
Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Beebe, N. L., & Clark, J. G. (2005). A Hierarchical, Objectives-Based Framework <strong>for</strong><br />
the Digital Investigations Process. Digital Investigation, 2(2), 147-167.<br />
Berghel, H. (2007). Hiding <strong>Data</strong>, <strong>for</strong>ensics, and anti-<strong>for</strong>ensics. Communication <strong>of</strong><br />
ACM, 50(4), 15-20.<br />
Black, P. E. (2005). S<strong>of</strong>tware assurance metrics and tool evaluation. Paper presented<br />
at the Proceedings <strong>of</strong> the 2005 International Conference on S<strong>of</strong>tware Engineering<br />
Research and Practice, Las Vegas, US.<br />
Boulanger, A. (2005). Open-source versus proprietary s<strong>of</strong>tware - Is one more reliable<br />
and secure than the other. IBM Systems Journal, 44(2), 239-249.<br />
Britz, M. T. (2008). Computer <strong>Forensic</strong>s and Cyber Crime: An Introduction (2 ed.):<br />
Prentice Hall.<br />
Brungs, A., & Jamieson, R. (2005). Identification <strong>of</strong> Legal Issues <strong>for</strong> Computer<br />
<strong>Forensic</strong>s. In<strong>for</strong>mation systems management, 22(2), 57.<br />
Bukhari, S., Yus<strong>of</strong>, I., & Abdullah, M. (2010). Per<strong>for</strong>mance evaluation <strong>of</strong> open-source<br />
disk imaging tools <strong>for</strong> collecting digital evidence Symposium conducted at the<br />
meeting <strong>of</strong> the Regional Conference on Knowledge Integration in ICT, Putrajaya,<br />
Malaysia.<br />
Byers, D., & Shahmehri, N. (2008). Contagious errors: Understanding and avoiding<br />
issues with imaging drives containing faulty sectors. Digital Investigation, 5(1-2),<br />
29-33.<br />
Byers, D., & Shahmehri, N. (2009). A systematic evaluation <strong>of</strong> disk imaging in<br />
EnCase 6.8 and LinEn 6.1. Digital Investigation, 6(1-2), 61-70.<br />
Byers, D., & Shahmehri, N. (2008a). <strong>Disk</strong> imaging evaluation: Encase 6.8/Linen 6.1.<br />
12(1). Retrieved from www.ep.liu.se/ea/cis/2009/001/cis09001.pdf<br />
Caloyannides, M. A., Memon, N., & Venema, W. (2009). Digital <strong>for</strong>ensics. IEEE<br />
security and privacy, 7(2), 16-17.<br />
Carrier, B. (2002). Open Source Digital <strong>Forensic</strong>s <strong>Tools</strong>: A legal argument. Retrieved<br />
21st February 2010 from http://www.digitalevidence.org/papers/opensrc_legal.pdf<br />
Carrier, B., & Spaf<strong>for</strong>d, E. H. (2003). Getting physical with the digital investigation<br />
process. International Journal <strong>of</strong> Digital Evidence, 2(2).<br />
Carrier, B. (2005). Digital <strong>for</strong>ensics tool testing images. Retrieved 13th Mar, 2010,<br />
from http://dftt.source<strong>for</strong>ge.net.<br />
122