30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Erbacher, R. F. (2010). Validation <strong>for</strong> digital <strong>for</strong>ensics. Paper presented at the meeting<br />

<strong>of</strong> the 2010 Seventh International Conference on New Generation In<strong>for</strong>mation<br />

Technology, Las Vegas, US.<br />

Etter, B. (2001). The <strong>for</strong>ensic challenges <strong>of</strong> e-crime Symposium conducted at the<br />

meeting <strong>of</strong> the 7th Indo-Pacific Congress on Legal Medicine and <strong>Forensic</strong><br />

Sciences, Melbourne, Australia.<br />

Farmer, D., & Venema, W. (1999). Computer <strong>for</strong>ensics analysis class handouts.<br />

Retrieved 10th Mar, 2010, from http://www.fish.com/<strong>for</strong>ensics/class.html<br />

Freiling, F. C., & Schwittay, B. (2006). A Common Process Model <strong>for</strong> Incident<br />

Response and Computer <strong>Forensic</strong>s. Communications <strong>of</strong> the ACM, 48, 8.<br />

<strong>Forensic</strong>sWiki. (2010). iLook. Retrieved 2nd Feb, 2010, from<br />

http://www.<strong>for</strong>ensicswiki.org/wiki/ILook<br />

Garfinkel, L. S. (2010). Digital <strong>for</strong>ensics research: the next 10 years. Digital<br />

Investigation, 7, S64-S73.<br />

Gavrila, S. I. (2005). FS-TST 2.0: <strong>Forensic</strong> s<strong>of</strong>tware Ttesting support tools, National<br />

Institute <strong>of</strong> Justice.<br />

Gibson, S. (2010). AIR - Automated Image and Restore. Retrieved 21st March, 2010,<br />

from http://air-imager.source<strong>for</strong>ge.net/<br />

Gleason, B. (2009). Alternatives to Helix3. Retrieved 21st March, 2010, from<br />

http://www.<strong>for</strong>ensicfocus.com/index.php?name=Content&pid=172&page=1<br />

Goel, A. L. (1985). S<strong>of</strong>tware Reliability Models: Assumptions, Limitations, and<br />

Applicability. IEEE Transactions on S<strong>of</strong>tware Engineering, SE-11(12), 1411-<br />

1424.<br />

Grossman, J. (2007). Website Security Statistics Report. Santa Clara. Retrieved 18th<br />

February 2010 from<br />

http://www.whitehatsec.com/home/assets/WPStatsreport_100107.pdf<br />

GuidanceS<strong>of</strong>tware. (2010). EnCase <strong>for</strong>ensic version 6.17 user guide. Pasadena, CA.<br />

Guidance. (2010). EnCase <strong>for</strong>ensic features and functionality. Retrieved from 22 nd ,<br />

Mar 2010<br />

http://www.guidances<strong>of</strong>tware.com/WorkArea/DownloadAsset.aspx?id=671<br />

Guo, Y., & Slay, J. (2010). A Function Oriented Methodology to Validate and Verify<br />

<strong>Forensic</strong> Copy Function <strong>of</strong> Digital <strong>Forensic</strong> <strong>Tools</strong>. Paper presented at ARES 2010<br />

International Conference on Availability, Reliability, and Security.<br />

124

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!