30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Payne, C. (2002). On the Security <strong>of</strong> Open Source S<strong>of</strong>tware. In<strong>for</strong>mation Systems<br />

Journal, 12, 61-78.<br />

PCMag. (2002). Event Monitoring. Retrieved 2nd, Feb, 2010, from<br />

http://www.pcmag.com/print_article2/0,1217,a=28321,00.asp?hidPrint=true<br />

Perrin, C. (2008). Not invented here has no place in open source development.<br />

Retrieved 18 March from http://blogs.techrepublic.com.com/security/?p=460<br />

Peterson, G., Shenoi, S., & Beebe, N. (2009). Digital <strong>Forensic</strong> Research: The Good,<br />

the Bad and the Unaddressed. In Advances in Digital <strong>Forensic</strong>s V (Vol. 306, pp.<br />

17-36): Springer Boston.<br />

Pollitt, M. (1995). Computer <strong>Forensic</strong>s: an Approach to Evidence in Cyberspace.<br />

Paper presented at the Proceeding <strong>of</strong> the National In<strong>for</strong>mation Systems Security<br />

Conference.<br />

Raymond, E. S. (2002). The cathedral and the bazaar. Retrieved 18 March from<br />

http://www.catb.org/~esr/writings/cathedral-bazaar/<br />

Reichenkron, T. (2006). Security Issues In Open Source Project. Paper presented at<br />

the Open source S<strong>of</strong>tware Engineering, Berlin.<br />

Reith, M., Carr, C., & Gunsch, G. (2002). An examination <strong>of</strong> digital <strong>for</strong>ensic models.<br />

International Journal <strong>of</strong> Digital Evidence, 1(3).<br />

Ridder, C. K. (2009). Evidentiary Implications <strong>of</strong> Potential Security Weaknesses in<br />

<strong>Forensic</strong> S<strong>of</strong>tware. International Journal <strong>of</strong> Digital Crime and <strong>Forensic</strong>s, 1(3),<br />

80-91.<br />

Rohilla, V., & Malik, S. (2008). S<strong>of</strong>tware verification and validation Symposium<br />

conducted at the meeting <strong>of</strong> the Proceedings <strong>of</strong> the 2nd National Conference<br />

INDIACOM-2008, New Delhi, India.<br />

Rogers, M. (2003). Computer <strong>for</strong>ensics: science or fad. Security Wire Digest, 5(55).<br />

Rogers, M. K., & Seigfried, K. (2004). The future <strong>of</strong> computer <strong>for</strong>ensics: a needs<br />

analysis survey. Computers & Security, 23(1), 12-16.<br />

Rogers, M. K., Goldman, J., Mislan, R., Wedge, T., & Debrota, S. (2006). Computer<br />

<strong>Forensic</strong>s Field Triage Process Model. Paper presented at the Proceedings <strong>of</strong> the<br />

Conference on Digital <strong>Forensic</strong>s, Security and Law.<br />

Roussev, V. and Richard III, G.G. (2006). Next-generation digital <strong>for</strong>ensics.<br />

Communication <strong>of</strong> ACM, 49(2), 76-80.<br />

128

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!