13.09.2016 Views

BATTLEFIELD DIGITAL FORENSICS

BDF_Battlefield_Digital_Forensics_final

BDF_Battlefield_Digital_Forensics_final

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

[15] E. Imsand and J. A. Hamilton, Jr., “Digital Battlefield Forensics”, In Proceeding of the 15th Colloquium for<br />

Information Systems Security Education, Fairborn, Ohio, June 13-15, 2011.<br />

[16] M. Perklin, “Anti-forensics and anti-anti-forensics”, Defcon 20, 2012, [Online]. Available:<br />

https://www.defcon.org/images/defcon-20/dc-20-presentations/Perklin/DEFCON-20-Perklin-AntiForensics.pdf.<br />

[Accessed 27 April 2016].<br />

[17] C. Zoubek, S. Seufert, and A. Dewald, “Generic RAID reassembly using block-level entropy”, Digital<br />

Investigation 16 (2016), S44-S54, Proceedings of the Third Annual DFRWS Europe<br />

[18] G. C. Kessler, “Anti-Forensics and the Digital Investigator”, Australian Digital Forensics Conference, 2007.<br />

[19] J. Wakefield, “Devices being remotely wiped in police custody”, 09 October 2014, BBC News, [Online].<br />

Available: http://www.bbc.com/news/technology-29464889. [Accessed 21 February 2016].<br />

[20] G. Zanin, A. Mei and L. V. Mancini, "A Secure and Efficient Large Scale Distributed System for Data<br />

Sharing," 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06), Lisboa, Portugal,<br />

2006, pp. 27-27. doi: 10.1109/ICDCS.2006.11<br />

[21] L. Cleghorn, “Example of Manipulating a Graceful Shutdown To Prevent Evidence Recovery”, eForensics<br />

Magazine 3(5), 2015. ISSN 2300-6986<br />

[22] S. Azadegan, W. Yu, H. Liu, M. Sistani and S. Acharya, "Novel Anti-forensics Approaches for Smart<br />

Phones," System Science (HICSS), 2012 45th Hawaii International Conference on, Maui, HI, 2012, pp. 5424-5431.<br />

doi: 10.1109/HICSS.2012.452<br />

[23] P. Knüfer, “Mitigating Anti-Forensics: A Schema-based Approach”, Ruhr-Universität Bochum, Bochum,<br />

Bachelor’s Thesis, 2015.<br />

[24] T. Väisänen, A. Farar, N. Pissanidis, C. Braccini, B. Blumbergs, and E. Diez, “Defending mobile devices for<br />

high level officials and decision-makers”, NATO CCD COE, Tallinn, 2015. [Online]. Available:<br />

https://ccdcoe.org/sites/default/files/multimedia/pdf/Defending%20mobile%20devices%20for%20high%20lev<br />

el%20officials%20and%20decision-makers.pdf. [Accessed 21 February 2016].<br />

[25] R. Liscouski and W. McGann, “The Evolving Challenges for Explosive Detection in the Aviation Sector and<br />

Beyond”, 19 May 2016, [Online]. Available: https://www.ctc.usma.edu/posts/the-evolving-challenges-forexplosive-detection-in-the-aviation-sector-and-beyond.<br />

[Accessed 22 May 2016].<br />

[26] A. Verma, “USB Killer Version 2.0 Burns and Destroys Your Computer”, 13 October 2015, fossBytes,<br />

[Online]. Available: http://fossbytes.com/usb-killer-version-2-0-is-here-to-burn-and-destroy-your-computer/.<br />

[Accessed 12 April 2016].<br />

[27] Massachusetts Digital Evidence Consortium, “Digital evidence guide for first responders”, May 2015.<br />

[Online]. Available: http://www.iacpcybercenter.org/wp-content/uploads/2015/04/digitalevidence-booklet-<br />

051215.pdf [Accessed 17 June 2016].<br />

[28] D. L. Watson and A. Jones, “Digital forensics processing and procedures”, Elsevier 2013, pp. 313 – 348.<br />

[29] M. Smith, “PC ports explained: Get to know the back of your computer”, 06 October 2012, [Online].<br />

Available: http://www.digitaltrends.com/buying-guides/pc-ports-explained-get-to-know-the-back-of-yourcomputer-2/.<br />

[Accessed 24 May 2016].<br />

64

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!