25.12.2013 Views

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

REFERENCES<br />

Access Data, 2012. FTK. Available at: http://www.accessdata.com/products/digitalforensics/ftk.<br />

[Accessed June 14, 2012].<br />

ACPO, 2010. Good practice guide for computer based evidence. Available at:<br />

http://www.7safe.com/electronic_evidence/ACPO_guidelines_computer_evidence.<br />

<strong>pdf</strong> [Accessed October 20, 2012].<br />

Anderson, C.A., Benjamin, A.J. & Bartholow, B.D., 1998. Does the gun pull the<br />

trigger? Automatic priming effects of weapon pictures and weapon names.<br />

Psychological Science, 9(4), pp.308–314.<br />

Bainbridge, D., 2007. Criminal law tackles computer fraud and misuse. Computer Law<br />

& Security Review, 23(3), pp.276–281.<br />

Ball, C., 2007. Cross-examination of the Computer Forensics Expert. Available at:<br />

http://www.craigball.com/expertcross.<strong>pdf</strong> [Accessed December 11, 2011].<br />

Bem, D., Huebner, E., 2007. Computer forensic analysis in a virtual environment.<br />

International journal of digital evidence, 6(2).<br />

Berinato, S., 2007. How Online Criminals Make Themselves Tough to Find, Near<br />

Impossible to Nab. CIO.com. Available at:<br />

http://www.proofspace.com/UserFiles/File/CIO_com2007_05_31.<strong>pdf</strong>. [Accessed<br />

July 24, 2012].<br />

Bogen, A., Dampier, D., 2005. Preparing for Large-Scale Investigations with Case<br />

Domain Modeling. Digital Forensics Research Workshop, New Orleans, LA, pp.1–<br />

10.<br />

Boyd, C., Forster, P., 2004. Time and date issues in forensic computing - A case study.<br />

Digital Investigation, 1(1), pp.18–23.<br />

Buchholz, F., Spafford, E, 2004. On the role of file system metadata in digital forensics.<br />

Digital Investigation, 1(4), pp.298–309.<br />

Burghardt, A. et al., 2008. Using the HFSD journal for deleted file recovery. Digital<br />

Forensics Research Workshop, Baltimore, MD, pp.76–82.<br />

Byers, S., 2004. Information leakage caused by hidden data in published documents.<br />

Security & Privacy, IEEE, 2(2), pp.23–27.<br />

Calhoun, W.C. & Coles, D., 2008. Predicting the types of file fragments. Digital<br />

Investigation, 5(SUPPL.), pp.S14–S20.<br />

<strong>Cranfield</strong> <strong>University</strong> |<br />

297

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!