23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chawathe, S. S., Krishnamurthy, V., Ramachandran, S., & Sarma, S. (2004).<br />

Manag<strong>in</strong>g <strong>RFID</strong> data. In M. A. Nascimento, M. T. Özsu, D. Kossmann,<br />

R. J. Miller, J. A. Blakeley, & K. B. Schiefer (Eds.), In Proceed<strong>in</strong>gs of<br />

the Thirtieth International Conference on Very Large Data Bases, 30(pp.<br />

1189-1195). Toronto, Canada: VLDB Endowment.<br />

Chawla, V., & Ha, D. S. (2007). An overview of passive <strong>RFID</strong>. Communications<br />

Magaz<strong>in</strong>e, IEEE , 45(9), 11-17, September 2007.<br />

Cohen, F. (2009). Two models of digital forensic exam<strong>in</strong>ation. In Proceed<strong>in</strong>gs of<br />

the Fourth International IEEE Workshop on Systematic Approaches to<br />

<strong>Digital</strong> Forensic Eng<strong>in</strong>eer<strong>in</strong>g, SADFE’09, 42-53. Los Alamitos,<br />

California, United States of America: IEEE Computer Society.<br />

doi:10.1109/SADFE.2009.8<br />

Coll<strong>in</strong>s, J., & Hussey, R. (2003). Bus<strong>in</strong>ess research: a practical guide for<br />

undergraduate and postgraduate students (2nd ed.). United K<strong>in</strong>gdom:<br />

Palgrave Macmillan.<br />

Delaney, K. (2007). Inside Microsoft SQL Server 2005: the storage eng<strong>in</strong>e.<br />

Redmond, Wash<strong>in</strong>gton: Microsoft Press.<br />

<strong>Digital</strong> Forensic Research Workshop (DFRWS). (2001, November). A Road map<br />

for digital forensic research. New York, United States of America: Gary<br />

Palmer.<br />

D<strong>in</strong>g, Z., Li, J., & Bo, F. (2008). A taxonomy model of <strong>RFID</strong> security threats. In<br />

IEEE International Conference on Communication Technology<br />

Proceed<strong>in</strong>gs (2008), 765-768. United States of America: The Institute of<br />

Electrical and Electronics Eng<strong>in</strong>eers, Inc.<br />

Dolan-Gavitt, B. (2008). Forensic analysis of the W<strong>in</strong>dows registry <strong>in</strong> memory.<br />

The Journal of <strong>Digital</strong> <strong>Investigation</strong>, 5(2008), S26-S32.<br />

doi:10.1016/j.di<strong>in</strong>.2008.05.003<br />

Dul, J., & Hak, T. (2008). Case study methodology <strong>in</strong> bus<strong>in</strong>ess research. Great<br />

Brita<strong>in</strong>: Butterworth-He<strong>in</strong>emann.<br />

e-fense, Inc. (2010). Helix3 Download. Retrieved from https://www.efense.com/store/<strong>in</strong>dex.php?_a=viewProd&productId=11<br />

e-fense, Inc. (2009). Helix3 2009 R2 User Manual - Live <strong>Forensics</strong> and Incident<br />

Response User Manual. United States of America: Author.<br />

161

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!