30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Kunda, D., & Brooks, L. (1999). Applying social-technical approach <strong>for</strong> COTS<br />

selection. Paper presented at the Proceedings <strong>of</strong> the 4th UKAIS conference,<br />

University <strong>of</strong> York, UK.<br />

Lin, A. C., Lin, L. L., Lan, T. H., & Wu, T.-C. (2005). Establishment <strong>of</strong> the Standards<br />

Operating Procedure <strong>for</strong> Gathering Digital Evidence. Paper presented at the<br />

Proceedings <strong>of</strong> the First International Workshop on Systematic Approaches to<br />

Digital <strong>Forensic</strong> Engineering (SADFE), Taibei, Taiwan.<br />

Lyle, J. R. (2003). NIST CFTT: Testing disk imaging tools. International Journal <strong>of</strong><br />

Digital Evidence, 1(4), 1-10.<br />

Lyle, J. R., & Wozar, M. (2007). Issues with imaging drives containing faulty sectors.<br />

Digital Investigation, 4(Supplement 1), 13-15.<br />

Malinowski, C., & Noble, R. (2007). Hashing and data integrity: Reliability <strong>of</strong> hashing<br />

and granularity size reduction. Digital Investigation, 4, 98-104.<br />

Maiden, N. A. M., & Ncube, C. (1998). Acquiring COTS s<strong>of</strong>tware selection<br />

requirements. Paper presented at the Requirements Engineering, 1998.<br />

Proceedings. 1998 Third International Conference on, Colorado Springs, CO.<br />

Manes, G. W., & Downing, E. (2009). Overview <strong>of</strong> Licensing and Legal Issues <strong>for</strong><br />

Digital <strong>Forensic</strong> Investigators. Security & Privacy, IEEE, 7(2), 45-48.<br />

Maxim, S. (2009). Linux <strong>for</strong> computer <strong>for</strong>ensic investigators: «pitfalls» <strong>of</strong> mounting<br />

file systems. Retrieved 9th Oct, 2010, from http://www.<strong>for</strong>ensicfocus.com/linux<strong>for</strong>ensics-pitfalls-<strong>of</strong>-mounting-file-systems<br />

Mercuri, R. (2005). Challenges in <strong>for</strong>ensic computing. Communication <strong>of</strong> ACM,<br />

48(12), 17-21.<br />

Meyrick, K. (2006). Host protected area - Creation <strong>of</strong> an HPA. Retrieved 16th Apr,<br />

2010, from http://en.wikipedia.org/wiki/File:Hpacreate.png<br />

Mitchell, R. L. (2009). Solid-state disks <strong>of</strong>fer 'fast erase' features. Computerworld,<br />

2009(Feburary).<br />

Mohay, G. (2005). Technical challenges and directions <strong>for</strong> digital <strong>for</strong>ensics. Paper<br />

presented at the Systematic Approaches to Digital <strong>Forensic</strong> Engineering, 2005.<br />

First International Workshop on.<br />

Moll, R., Prokop, M., & Morgenstern, H. (2009). Digital discovery with bootable CDs<br />

Symposium conducted at the meeting <strong>of</strong> the 2009 IT Security Incident<br />

Management and IT <strong>Forensic</strong>s Stuttgart, Germany.<br />

126

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!