25.12.2013 Views

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Guidance Software, 2011. Encase. Available at:<br />

http://www.guidancesoftware.com/encase-forensic.htm [Accessed December 28,<br />

2011].<br />

Guo, H., Xu, M., 2011. A Method for Recovering JPEG Files Based on Thumbnail. In<br />

2011 International Conference on Control, Automation and Systems Engineering<br />

(CASE). IEEE, pp. 1–4.<br />

Hall, G., Davis, W., 2005. Toward Defining the Intersection of Forensics and<br />

Information Technology. International Journal of Digital Evidence, 4(1), pp.1–20.<br />

Hama, G., Pollitt, M., 1996. Data reduction – refining the sieve. In Second International<br />

Conference on Digital Evidence.<br />

Hannan, M., 2004. To Revisit: What is Forensic Computing? Proceesings of the Second<br />

Australian Computer, Network & Information Forensics Conference. Available at:<br />

http://igneous.scis.ecu.edu.au/proceedings/2004/adf/Hannan.<strong>pdf</strong> [Accessed March<br />

29, 2012].<br />

Hargreaves, C., Chivers, H, 2007. Potential Impacts of Windows Vista on Digital<br />

Investigations. Proceesings of 2nd Advances in Computer Security and Forensics,<br />

Liverpool, UK.<br />

Hargreaves, C., Chivers, H., Titheridge, D., 2008. Windows Vista and digital<br />

investigations. Digital Investigation, 5(1-2), pp.34–48.<br />

Hargreaves, C., 2009. Assessing the reliability of digital evidence from live<br />

investigations involving encryption. PhD <strong>Thesis</strong>. <strong>Cranfield</strong> <strong>University</strong>.<br />

Harley, D., Citp, B., Cissp, F., 2010. SODDImy & the Trojan Defence. In 4th<br />

International Conference on Cybercrime Forensics Education and Training.<br />

Canterbury, UK.<br />

Harris, R., 2006. Arriving at an anti-forensics consensus: Examining how to define and<br />

control the anti-forensics problem. Digital Investigation, 3, Supplem(0), pp.44–49..<br />

Harris, R., 2007. Using Artificial Neural Networks for Forensic File Type<br />

Identification. CERIAS Tech Report. Available at:<br />

https://www.cerias.purdue.edu/assets/<strong>pdf</strong>/bibtex_archive/2007-19.<strong>pdf</strong> [Accessed<br />

July 19, 2010].<br />

Hayes, D., Qureshi, S., 2009. Implications of Microsoft Vista operating system for<br />

computer forensics investigations. IEEE Systems, Applications and Technology<br />

Conference, 2009. LISAT '09. Long Island, NY.<br />

<strong>Cranfield</strong> <strong>University</strong> |<br />

301

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!