25.12.2013 Views

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Noblett, M., Pollitt, M., Presley, L., 2000. Recovering and examining computer forensic<br />

evidence. Forensic Science Communications, 2(4), pp.1–13.<br />

NOXA, 2008. NOXA: Vista Thumbnail Cache. Available at:<br />

http://www.noxa.org/blog/2008/02/02/vista-thumbnail-cache/. [Accessed October<br />

31, 2011]<br />

OED, 2011. OED - Oxford English Dictionary. Available at: http://www.oed.com/<br />

[Accessed May 25, 2011].<br />

Open Office, 2012. Open Office. Available at: http://www.openoffice.org/ [Accessed<br />

January 18, 2012].<br />

Ozdemir, S., 2002. Non-Malicious Destruction of Data. SANS Institute InfoSec Reading<br />

Room.<br />

Pal, A., Sencar, H., Memon, N, 2008. Detecting file fragmentation point using<br />

sequential hypothesis testing. Digital Investigation.5 Supp, pp. S2-S13.<br />

Pal, A., Memon, N, 2009. The evolution of file carving. IEEE Signal Processing<br />

Magazine, 26(2), pp.59–71.<br />

Palmer, G., 2002. Forensic analysis in the digital world. International Journal of Digital<br />

Evidence, 1(1), pp.1–6.<br />

Pan, L., Batten, L., 2007. An effective and efficient testing methodology for correctness<br />

testing for file recovery tools. IEEE Intelligent Information Hiding and Multimedia<br />

Signal Processing.<br />

Park, B., Park, J., Lee, S., 2009. Data concealment and detection in Microsoft Office<br />

2007 files. Digital Investigation, 5(3-4), pp.104–114.<br />

Parsonage, H., 2012. Under my thumbs. Available at:<br />

http://computerforensics.parsonage.co.uk/downloads/UnderMyThumbs.<strong>pdf</strong>.<br />

[Accessed June 14, 2012]<br />

Penhallurick, M., 2005. Methodologies for the use of VMware to boot cloned/mounted<br />

subject hard disk images. Digital Investigation, 2(3), pp.209–222.<br />

Police and Criminal Evidence Act 1984 (PACE) (1984 c. 60)<br />

Pomeranz, D., Shemesh, M. & Ben-Shahar, O., 2011. A fully automated greedy square<br />

jigsaw puzzle solver. In Computer Vision and Pattern Recognition (CVPR), 2011<br />

IEEE Conference on. pp. 9–16.<br />

R v Porter (Ross Warwick) [2006] EWCA Crim 560<br />

<strong>Cranfield</strong> <strong>University</strong> |<br />

304

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!