13.09.2016 Views

BATTLEFIELD DIGITAL FORENSICS

BDF_Battlefield_Digital_Forensics_final

BDF_Battlefield_Digital_Forensics_final

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

11 References<br />

[1] W. G. Perry, "Information Warfare: Assuring Digital Intelligence Collection," The Joint Special Operations<br />

University (JSOU) Press, Hurlburt Field, Florida, 2009. Available:<br />

https://ntrl.ntis.gov/NTRL/dashboard/searchResults/titleDetail/ADA514505.xhtml [Accessed 28 June 2016]<br />

[2] Headquarters, Department of the Army, “ATP 3-90.15 Site Exploitation”, [Online]. Available:<br />

https://armypubs.us.army.mil/doctrine/index.html. [Accessed 16 June 2016].<br />

[3] Center for Army Lessons Learned (CALL), “Tactical Site Exploitation and Cache Search Operations, Tactics<br />

Techniques, and Procedures”, No. 7-26, May 2007. [Online]. Available:<br />

http://nsarchive.gwu.edu/NSAEBB/NSAEBB410/docs/Tactical%20Site%20Exploitation.pdf. [Accessed 25 May<br />

2016].<br />

[4] E. Lorge, "Shining light on battlefield forensics," The official homepage of the United States Army, 27 May<br />

2010. [Online]. Available: https://www.army.mil/article/39956/. [Accessed 17 June 2016].<br />

[5] A. Mei, L. V. Mancini, and S. Jajodia, “Secure dynamic fragment and replica allocation in large-scale<br />

distributed file systems”, in IEEE Transactions on Parallel and Distributed Systems, vol. 14, no. 9, pp. 885-896,<br />

Sept. 2003. Doi: 10.1109/TPDS.2003.1233711<br />

[6] A. Di Mauro, A. Mei, and S. Jajodia, ”Secure File Allocation and Caching in Large-scale Distributed Systems”,<br />

SECRYPT 2012: pp. 182-191, 2012.<br />

[7] R. Di Pietro, L. V. Mancini, and A. Mei, “Towards threat-adaptive dynamic fragment replication in large scale<br />

distributed systems”. IEEE IPDPS, 2007.<br />

[8] T. Väisänen, “Security of a VoIP call in hybrid mobile ad hoc networks”, Master’s thesis, University of Oulu,<br />

Oulu, 2006.<br />

[9] K. Fall, “A Delay-Tolerant Network Architecture for Challenged Internets”, In Proceedings of the 2003<br />

conference on Applications, technologies, architectures, and protocols for computer communications<br />

(SIGCOMM ’03), ACM, New York, NY, USA, 2003, pp. 27-34. doi:10.1145/863955.863960<br />

[10] L. Pelusi, A. Passarella and M. Conti, "Opportunistic networking: data forwarding in disconnected mobile<br />

ad hoc networks," IEEE Communications Magazine, vol. 44, no. 11, pp. 134-141, 2006.<br />

[11] V. N. G. J. Soares and J. J. P. C. Rodrigues, “Cooperation in DTN-Based Network Architectures”, in<br />

Cooperative Networking, 2011, pp. 101-115.<br />

[12] A. Mei and J. Stefa, "Routing in Outer Space: Fair Traffic Load in Multihop Wireless Networks," in IEEE<br />

Transactions on Computers, vol. 58, no. 6, pp. 839-850, June 2009.<br />

doi: 10.1109/TC.2009.17<br />

[13] P. Zdzichowski, M. Sadlon, T. U. Väisänen, A. Botas Munoz, and K. Filipczak, “Anti-forensics study”, NATO<br />

CCD COE, Tallinn, 2015. [Online]. Available:<br />

https://ccdcoe.org/sites/default/files/multimedia/pdf/AF_with%20intro.pdf [Accessed 21 February 2016].<br />

[14] Á Botas, R. J. Rodríguez, T. Väisänen and P. Zdzichowski, "Counterfeiting and Defending the Digital Forensic<br />

Process," Computer and Information Technology; Ubiquitous Computing and Communications; Dependable,<br />

Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015 IEEE<br />

International Conference on, Liverpool, 2015, pp. 1966-1971.<br />

doi: 10.1109/CIT/IUCC/DASC/PICOM.2015.291<br />

63

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!