25.12.2013 Views

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Carnagey, N.L., Anderson, C.A. & Bushman, B.J., 2007. The effect of video game<br />

violence on physiological desensitization to real-life violence. Journal of<br />

Experimental Social Psychology, 43(3), pp.489–496.<br />

Carney, M., Rogers, M, 2004. The Trojan Made Me Do It: A First Step in Statistical<br />

Based Computer Forensics Event Reconstruction. International Journal of Digital<br />

Evidence, 2(4).<br />

Carrier, B., 2002. Open Source Digital Forensics Tools,@stake Research Report.<br />

Carrier, B., Spafford, EH, 2003a. Getting physical with the digital investigation process.<br />

International Journal of Digital Evidence, 2(2), pp.1–20.<br />

Carrier, B., 2003b. Defining digital forensic examination and analysis tools using<br />

abstraction layers. International Journal of digital evidence, 1(4), pp.1–12.<br />

Carrier, B., 2005. File system forensic analysis, Addison Wesley. Available at:<br />

http://www.amazon.co.uk/System-Forensic-Analysis-Brian-<br />

Carrier/dp/0321268172 [Accessed March 29, 2013].<br />

Carrier, B., Spafford, EH, 2006. Categories of digital investigation analysis techniques<br />

based on the computer history model. digital investigation, pp.121–130.<br />

Carrier, B., 2011. Autopsy. Available at: http://www.sleuthkit.org/autopsy/. [Accessed<br />

February 12, 2012].<br />

Casey, E., 2004. Tool review WinHex. Digital Investigation,1(2), pp.114–128.<br />

Casey, E, 2006. The value of behavioral analysis in digital investigations. Digital<br />

Investigation, 3(2), pp.57–58.<br />

Casey, E, 2007. What does “forensically sound” really mean? Digital Investigation,<br />

4(2), pp.49–50.<br />

Casey, E, 2008. The impact of full disk encryption on digital forensics. ACM SIGOPS<br />

Operating Systems Review, 42(3), pp.93–98.<br />

Castiglione, A., De Santis, A. & Soriente, C., 2007. Taking advantages of a<br />

disadvantage: Digital forensics and steganography using document metadata.<br />

Component-Based Software Engineering of Trustworthy Embedded Systems, 80(5),<br />

pp.750–764.<br />

Chivers, H., Hargreaves, C., 2011. Forensic data recovery from the Windows Search<br />

Database. Digital Investigation, pp.114–126.<br />

<strong>Cranfield</strong> <strong>University</strong> |<br />

298

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!