30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Beebe, N. L., & Clark, J. G. (2005). A Hierarchical, Objectives-Based Framework <strong>for</strong><br />

the Digital Investigations Process. Digital Investigation, 2(2), 147-167.<br />

Berghel, H. (2007). Hiding <strong>Data</strong>, <strong>for</strong>ensics, and anti-<strong>for</strong>ensics. Communication <strong>of</strong><br />

ACM, 50(4), 15-20.<br />

Black, P. E. (2005). S<strong>of</strong>tware assurance metrics and tool evaluation. Paper presented<br />

at the Proceedings <strong>of</strong> the 2005 International Conference on S<strong>of</strong>tware Engineering<br />

Research and Practice, Las Vegas, US.<br />

Boulanger, A. (2005). Open-source versus proprietary s<strong>of</strong>tware - Is one more reliable<br />

and secure than the other. IBM Systems Journal, 44(2), 239-249.<br />

Britz, M. T. (2008). Computer <strong>Forensic</strong>s and Cyber Crime: An Introduction (2 ed.):<br />

Prentice Hall.<br />

Brungs, A., & Jamieson, R. (2005). Identification <strong>of</strong> Legal Issues <strong>for</strong> Computer<br />

<strong>Forensic</strong>s. In<strong>for</strong>mation systems management, 22(2), 57.<br />

Bukhari, S., Yus<strong>of</strong>, I., & Abdullah, M. (2010). Per<strong>for</strong>mance evaluation <strong>of</strong> open-source<br />

disk imaging tools <strong>for</strong> collecting digital evidence Symposium conducted at the<br />

meeting <strong>of</strong> the Regional Conference on Knowledge Integration in ICT, Putrajaya,<br />

Malaysia.<br />

Byers, D., & Shahmehri, N. (2008). Contagious errors: Understanding and avoiding<br />

issues with imaging drives containing faulty sectors. Digital Investigation, 5(1-2),<br />

29-33.<br />

Byers, D., & Shahmehri, N. (2009). A systematic evaluation <strong>of</strong> disk imaging in<br />

EnCase 6.8 and LinEn 6.1. Digital Investigation, 6(1-2), 61-70.<br />

Byers, D., & Shahmehri, N. (2008a). <strong>Disk</strong> imaging evaluation: Encase 6.8/Linen 6.1.<br />

12(1). Retrieved from www.ep.liu.se/ea/cis/2009/001/cis09001.pdf<br />

Caloyannides, M. A., Memon, N., & Venema, W. (2009). Digital <strong>for</strong>ensics. IEEE<br />

security and privacy, 7(2), 16-17.<br />

Carrier, B. (2002). Open Source Digital <strong>Forensic</strong>s <strong>Tools</strong>: A legal argument. Retrieved<br />

21st February 2010 from http://www.digitalevidence.org/papers/opensrc_legal.pdf<br />

Carrier, B., & Spaf<strong>for</strong>d, E. H. (2003). Getting physical with the digital investigation<br />

process. International Journal <strong>of</strong> Digital Evidence, 2(2).<br />

Carrier, B. (2005). Digital <strong>for</strong>ensics tool testing images. Retrieved 13th Mar, 2010,<br />

from http://dftt.source<strong>for</strong>ge.net.<br />

122

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!