Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...
Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...
Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Erbacher, R. F. (2010). Validation <strong>for</strong> digital <strong>for</strong>ensics. Paper presented at the meeting<br />
<strong>of</strong> the 2010 Seventh International Conference on New Generation In<strong>for</strong>mation<br />
Technology, Las Vegas, US.<br />
Etter, B. (2001). The <strong>for</strong>ensic challenges <strong>of</strong> e-crime Symposium conducted at the<br />
meeting <strong>of</strong> the 7th Indo-Pacific Congress on Legal Medicine and <strong>Forensic</strong><br />
Sciences, Melbourne, Australia.<br />
Farmer, D., & Venema, W. (1999). Computer <strong>for</strong>ensics analysis class handouts.<br />
Retrieved 10th Mar, 2010, from http://www.fish.com/<strong>for</strong>ensics/class.html<br />
Freiling, F. C., & Schwittay, B. (2006). A Common Process Model <strong>for</strong> Incident<br />
Response and Computer <strong>Forensic</strong>s. Communications <strong>of</strong> the ACM, 48, 8.<br />
<strong>Forensic</strong>sWiki. (2010). iLook. Retrieved 2nd Feb, 2010, from<br />
http://www.<strong>for</strong>ensicswiki.org/wiki/ILook<br />
Garfinkel, L. S. (2010). Digital <strong>for</strong>ensics research: the next 10 years. Digital<br />
Investigation, 7, S64-S73.<br />
Gavrila, S. I. (2005). FS-TST 2.0: <strong>Forensic</strong> s<strong>of</strong>tware Ttesting support tools, National<br />
Institute <strong>of</strong> Justice.<br />
Gibson, S. (2010). AIR - Automated Image and Restore. Retrieved 21st March, 2010,<br />
from http://air-imager.source<strong>for</strong>ge.net/<br />
Gleason, B. (2009). Alternatives to Helix3. Retrieved 21st March, 2010, from<br />
http://www.<strong>for</strong>ensicfocus.com/index.php?name=Content&pid=172&page=1<br />
Goel, A. L. (1985). S<strong>of</strong>tware Reliability Models: Assumptions, Limitations, and<br />
Applicability. IEEE Transactions on S<strong>of</strong>tware Engineering, SE-11(12), 1411-<br />
1424.<br />
Grossman, J. (2007). Website Security Statistics Report. Santa Clara. Retrieved 18th<br />
February 2010 from<br />
http://www.whitehatsec.com/home/assets/WPStatsreport_100107.pdf<br />
GuidanceS<strong>of</strong>tware. (2010). EnCase <strong>for</strong>ensic version 6.17 user guide. Pasadena, CA.<br />
Guidance. (2010). EnCase <strong>for</strong>ensic features and functionality. Retrieved from 22 nd ,<br />
Mar 2010<br />
http://www.guidances<strong>of</strong>tware.com/WorkArea/DownloadAsset.aspx?id=671<br />
Guo, Y., & Slay, J. (2010). A Function Oriented Methodology to Validate and Verify<br />
<strong>Forensic</strong> Copy Function <strong>of</strong> Digital <strong>Forensic</strong> <strong>Tools</strong>. Paper presented at ARES 2010<br />
International Conference on Availability, Reliability, and Security.<br />
124