Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...
Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...
Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Kunda, D., & Brooks, L. (1999). Applying social-technical approach <strong>for</strong> COTS<br />
selection. Paper presented at the Proceedings <strong>of</strong> the 4th UKAIS conference,<br />
University <strong>of</strong> York, UK.<br />
Lin, A. C., Lin, L. L., Lan, T. H., & Wu, T.-C. (2005). Establishment <strong>of</strong> the Standards<br />
Operating Procedure <strong>for</strong> Gathering Digital Evidence. Paper presented at the<br />
Proceedings <strong>of</strong> the First International Workshop on Systematic Approaches to<br />
Digital <strong>Forensic</strong> Engineering (SADFE), Taibei, Taiwan.<br />
Lyle, J. R. (2003). NIST CFTT: Testing disk imaging tools. International Journal <strong>of</strong><br />
Digital Evidence, 1(4), 1-10.<br />
Lyle, J. R., & Wozar, M. (2007). Issues with imaging drives containing faulty sectors.<br />
Digital Investigation, 4(Supplement 1), 13-15.<br />
Malinowski, C., & Noble, R. (2007). Hashing and data integrity: Reliability <strong>of</strong> hashing<br />
and granularity size reduction. Digital Investigation, 4, 98-104.<br />
Maiden, N. A. M., & Ncube, C. (1998). Acquiring COTS s<strong>of</strong>tware selection<br />
requirements. Paper presented at the Requirements Engineering, 1998.<br />
Proceedings. 1998 Third International Conference on, Colorado Springs, CO.<br />
Manes, G. W., & Downing, E. (2009). Overview <strong>of</strong> Licensing and Legal Issues <strong>for</strong><br />
Digital <strong>Forensic</strong> Investigators. Security & Privacy, IEEE, 7(2), 45-48.<br />
Maxim, S. (2009). Linux <strong>for</strong> computer <strong>for</strong>ensic investigators: «pitfalls» <strong>of</strong> mounting<br />
file systems. Retrieved 9th Oct, 2010, from http://www.<strong>for</strong>ensicfocus.com/linux<strong>for</strong>ensics-pitfalls-<strong>of</strong>-mounting-file-systems<br />
Mercuri, R. (2005). Challenges in <strong>for</strong>ensic computing. Communication <strong>of</strong> ACM,<br />
48(12), 17-21.<br />
Meyrick, K. (2006). Host protected area - Creation <strong>of</strong> an HPA. Retrieved 16th Apr,<br />
2010, from http://en.wikipedia.org/wiki/File:Hpacreate.png<br />
Mitchell, R. L. (2009). Solid-state disks <strong>of</strong>fer 'fast erase' features. Computerworld,<br />
2009(Feburary).<br />
Mohay, G. (2005). Technical challenges and directions <strong>for</strong> digital <strong>for</strong>ensics. Paper<br />
presented at the Systematic Approaches to Digital <strong>Forensic</strong> Engineering, 2005.<br />
First International Workshop on.<br />
Moll, R., Prokop, M., & Morgenstern, H. (2009). Digital discovery with bootable CDs<br />
Symposium conducted at the meeting <strong>of</strong> the 2009 IT Security Incident<br />
Management and IT <strong>Forensic</strong>s Stuttgart, Germany.<br />
126