BATTLEFIELD DIGITAL FORENSICS
BDF_Battlefield_Digital_Forensics_final
BDF_Battlefield_Digital_Forensics_final
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
[15] E. Imsand and J. A. Hamilton, Jr., “Digital Battlefield Forensics”, In Proceeding of the 15th Colloquium for<br />
Information Systems Security Education, Fairborn, Ohio, June 13-15, 2011.<br />
[16] M. Perklin, “Anti-forensics and anti-anti-forensics”, Defcon 20, 2012, [Online]. Available:<br />
https://www.defcon.org/images/defcon-20/dc-20-presentations/Perklin/DEFCON-20-Perklin-AntiForensics.pdf.<br />
[Accessed 27 April 2016].<br />
[17] C. Zoubek, S. Seufert, and A. Dewald, “Generic RAID reassembly using block-level entropy”, Digital<br />
Investigation 16 (2016), S44-S54, Proceedings of the Third Annual DFRWS Europe<br />
[18] G. C. Kessler, “Anti-Forensics and the Digital Investigator”, Australian Digital Forensics Conference, 2007.<br />
[19] J. Wakefield, “Devices being remotely wiped in police custody”, 09 October 2014, BBC News, [Online].<br />
Available: http://www.bbc.com/news/technology-29464889. [Accessed 21 February 2016].<br />
[20] G. Zanin, A. Mei and L. V. Mancini, "A Secure and Efficient Large Scale Distributed System for Data<br />
Sharing," 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06), Lisboa, Portugal,<br />
2006, pp. 27-27. doi: 10.1109/ICDCS.2006.11<br />
[21] L. Cleghorn, “Example of Manipulating a Graceful Shutdown To Prevent Evidence Recovery”, eForensics<br />
Magazine 3(5), 2015. ISSN 2300-6986<br />
[22] S. Azadegan, W. Yu, H. Liu, M. Sistani and S. Acharya, "Novel Anti-forensics Approaches for Smart<br />
Phones," System Science (HICSS), 2012 45th Hawaii International Conference on, Maui, HI, 2012, pp. 5424-5431.<br />
doi: 10.1109/HICSS.2012.452<br />
[23] P. Knüfer, “Mitigating Anti-Forensics: A Schema-based Approach”, Ruhr-Universität Bochum, Bochum,<br />
Bachelor’s Thesis, 2015.<br />
[24] T. Väisänen, A. Farar, N. Pissanidis, C. Braccini, B. Blumbergs, and E. Diez, “Defending mobile devices for<br />
high level officials and decision-makers”, NATO CCD COE, Tallinn, 2015. [Online]. Available:<br />
https://ccdcoe.org/sites/default/files/multimedia/pdf/Defending%20mobile%20devices%20for%20high%20lev<br />
el%20officials%20and%20decision-makers.pdf. [Accessed 21 February 2016].<br />
[25] R. Liscouski and W. McGann, “The Evolving Challenges for Explosive Detection in the Aviation Sector and<br />
Beyond”, 19 May 2016, [Online]. Available: https://www.ctc.usma.edu/posts/the-evolving-challenges-forexplosive-detection-in-the-aviation-sector-and-beyond.<br />
[Accessed 22 May 2016].<br />
[26] A. Verma, “USB Killer Version 2.0 Burns and Destroys Your Computer”, 13 October 2015, fossBytes,<br />
[Online]. Available: http://fossbytes.com/usb-killer-version-2-0-is-here-to-burn-and-destroy-your-computer/.<br />
[Accessed 12 April 2016].<br />
[27] Massachusetts Digital Evidence Consortium, “Digital evidence guide for first responders”, May 2015.<br />
[Online]. Available: http://www.iacpcybercenter.org/wp-content/uploads/2015/04/digitalevidence-booklet-<br />
051215.pdf [Accessed 17 June 2016].<br />
[28] D. L. Watson and A. Jones, “Digital forensics processing and procedures”, Elsevier 2013, pp. 313 – 348.<br />
[29] M. Smith, “PC ports explained: Get to know the back of your computer”, 06 October 2012, [Online].<br />
Available: http://www.digitaltrends.com/buying-guides/pc-ports-explained-get-to-know-the-back-of-yourcomputer-2/.<br />
[Accessed 24 May 2016].<br />
64