|
參考文獻 [1]Bhupendra Singh, Upasna Singh , "A forensic insight into Windows 10 Jump Lists" Digital Investigation, Vol.17, pp. 1-13, 2016. [2]http://www.forensicswiki.org/wiki/Jump_Lists [accessed 18.May.2018]. [3]Larson T. Forensic examination of windows 7 jump lists. 2011. http://www.slideshare.net/ctin/windows-7-forensics-jump-listsrv3public [accessed 18.May.2018]. [4]Lyness R. Forensic analysis of windows 7 jump lists. 2012. http://articles.forensicfocus.com/2012/10/30/forensic-analysis-of-windows-7-jump-lists/ [accessed 18.May.2018]. [5]http://forensicswiki.org/wiki/OLE_Compound_File [accessed 18.May.2018]. [6]MSDN. [ms-cfb]: compound file binary file format. 2018. https://msdn.microsoft.com/en-us/library/dd942138.aspx [accessed 18. May.2018]. [7]MSDN. [ms-shllink]: shell link (.lnk) binary file format. 2017. https://msdn.microsoft.com/enus/library/dd871305.aspx [accessed 18. May.2018]. [8]NirSoft. Jumplistsview. 2018. http://www.nirsoft.net/utils/jump_lists_view.html [accessed 18.May.2018]. [9]Parsonage H. The meaning of linkfiles in forensic examinations 2010 http://computerforensics.parsonage.co.uk/linkfiles/linkfiles.htm [accessed 18.May.2018]. [10]Ghafarian, Ahmad, "Investigating Forensics Values of Windows Jump Lists Data" (2015). Annual ADFSL Conference on Digital Forensics, Security and Law. 3. [11]Lallie, Harjinder S. and Bains, Parmjit S. , "An Overview of the Jumplist Configuration File in Windows 7" Journal of Digital Forensics, Security and Law, Vol. 7, No. 1, Article 2, 2012. [12]MiTec. Structured storage viewer. 2010. http://www.mitec.cz/ssv.html[accessed 18.May.2018]. [13]TZWorks. Windows jump list parser (jmp). https://tzworks.net/prototype_page.php?proto_id=20;%202013 [accessed 18.May.2018]. [14]Woan M. Jumplister. 2013. http://www.woanware.co.uk/forensics/jumplister.html [accessed 18.May.2018]. [15]Chris Antonovich, "Jump List Forensics" LCDI Report,Burlington, VT, U.S.A, pp. l-18, 2014. [16]Eric Zimmerman 2016, Jump lists in depth (includes changes from Windows 10), https://binaryforay.blogspot.com/2016/02/jump-lists-in-depth-understand-format.html [accessed 18.May.2018]. [17]Harlan 2011 http://windowsir.blogspot.com/2011/12/jump-list-analysis.html [accessed 18.May.2018]. [18]Bhupendra Singh, Upasna Singh , "A forensic insight into Windows 10 Cortana search" Computers & Security, Vol.66, pp. 142-154, 2017. [19]Gavin R.2016 https://blogs.windows.com/windowsexperience/2016/04/28/ Delivering personalized search experiences in Windows 10 through Cortana.[accessed 18.May 2018]. [20]https://www.fonemonitor.com/phone-monitor/top-open-source-employee-monitoring-software.html[accessed 18.May 2018]. [21]Albert J. Marcella, Jr., Frederic Guillossou, Cyber Forensics: From Data to Digital Evidence , New Jersey, John Wiley & Sons, pp. 241-245, 2012. [22]https://www.spyzie.com/employee-tracking/top-open-source-employee-monitoring-software.html [accessed 18.May 2018]. [23]https://activtrak.com/[accessed 18.May 2018]. [24]https://www.teramind.co/[accessed 18.May 2018]. [25]https://www.vericlock.com/[accessed 18.May 2018]. [26]https://interguardsoftware.com/[accessed 18.May 2018]. [27]https://www.qustodio.com/en/[accessed 18.May 2018]. [28]https://www.veriato.com/[accessed 18.May 2018]. [29]https://www.timedoctor.com/[accessed 18.May 2018]. [30]https://www.fonemonitor.com/[accessed 18.May 2018]. [31]https://sonigasoftware.com/[accessed 18.May 2018]. [32]https://www.ckzinc.com/[accessed 18.May 2018]. [33]https://www.isafesoft.com/[accessed 18.May 2018]. [34]https://www.screenshotmonitor.com/[accessed 18.May 2018]. [35]https://clockit.io[accessed 18.May 2018].
|