|
[1] M. K. Rogers and K. Seigfried, "The Future of Computer Forensics: a Needs Analysis Survey," Computers & Security, vol. 23, pp. 12-16, 2004. [2] "2004 E-commerce Multi-sector Report," U.S. Department of Commerce, Economics and Statistics Administration 2006. [3] "2005 E-commerce Multi-sector Report," U.S. Department of Commerce, Economics and Statistics Administration 2007. [4] E. Casey, Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet, 1 ed.: Academic Press, 2001. [5] D. B. Parker, Fighting Computer Crime: A New Framework for Protecting Information: Wiley, 1998. [6] "1997 Global Software Piracy Report," Business Software Alliance 1998. [7] "2006 Global Software Piracy Report," Business Software Alliance 2007. [8] "2001 IFPI Music Piracy Report," International Federation of the Phonographic Industry (IFPI) 2002. [9] "2005 IFPI Music Piracy Report," International Federation of the Phonographic Industry (IFPI) 2006. [10] A. J. Marcella Jr., Greenfield Robert S. , Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, 1 ed.: AUERBACH, 2002. [11] K. J. Kuchta, "Forensic Fieldwork: Experience Is the Best Teacher," Information Systems Security, vol. 11, pp. 36-43, 2002. [12] G. Palmer, "A Road Map for Digital Forensics Research," in Digital Forensic Research Workshop(DFRWS), 2001. [13] S. Mocas, "Building Theoretical Underpinnings for Digital Forensics Research," Digital Investigation, 2004. [14] S. V. Hart, "Forensic Examination of Digital Evidence: A Guide for Law Enforcement," National Institute of Justice (NIJ) 2004. [15] C. E. Landwehr, "Computer Security," International Journal of Information Security, vol. 1, pp. 3-13, 2001. [16] B. Carrier, "Open Source Digital Forensics Tools," @stake.com 2003. [17] J. C. Keeney, "Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations," United States Department of Justice 2002. [18] B. D. Carrier and E. H. Spafford, "Defining Event Reconstruction of Digital Crime Scenes," Journal of Forensic Sciences, vol. 49, pp. 1291-1298, Nov 2004. [19] C. Hosmer, "Time Lining Computer Evidence," WetStone Technologys,Inc. 1998. [20] J. Kornblum, "Preservation of Fragile Digital Evidence by First Responders," in Digital Forensic Research Workshop (DFRWS), 2002. [21] F. Adelstein, "Live Forensics, Diagnosing Your System Without Killing It First," Communicatins of the ACM, vol. 49, 2006. [22] M. Foster and J. N.Wilson, "Process Forensics, a Pilot Study on the Use of Checkpointing Technology in Computer Forensics," International Journal of Digital Evidence, vol. 3, 2004. [23] A. Yasinsac and Y. Manzano, "Policies to Enhance Computer and Network Forensics," in IEEE Systems, Man, Cybernetic Information Assurance Workshop, 2001. [24] G. G. Richard and V. Roussev, "Next-Generation Digital Forensics," Communicatins of the ACM, vol. 49, pp. 76-80, 2006. [25] CPU-zilla, "Seagate Outlines the Future of Storage," 2006. [26] A. Serwer, "Dirty Rotten Numbers," in Fortune, 2002, pp. 42-45. [27] M. A. Vasarhelyi and F. B. Halper, "The Continuous Audit of Online System," Auditing: A Journal of Practice and Theory, vol. 10, pp. 110-125 1990. [28] D. Liang, C.-L. Fang, F. Lin, and C.-C. Lin, "A Portable Interceptor Mechanism on SOAP for Continuous Audit," in Asia Pacific Software Engineering Conference (APSEC). vol. 48, 2007, pp. 197-211. [29] W. Glenn, MCDST Self-Paced Training Kit: Support Users and Troubleshooting a Microsoft Windows XP Operating System: Microsoft Press 2004. [30] B. D. Carrier, "Risks of Live Digital Forensic Analysis," Communicatins of the ACM, vol. 49, 2006. [31] E. E. Kenneally and C. L. T. Brown, "Risk Sensitive Digital Evidence Collection," Digital Investigation, vol. 2, pp. 101-119, 2005. [32] R. Nolan, "First Responders Guide to Computer Forensics," Computer Emergency Response Team (CERT) 2005. [33] N. Barrett, Traces of Guilt: Corgi Adult, 2005. [34] E. Casey, "Case study: Network Intrusion Investigation - Lessons in Forensic Preparation," Digital Investigation, vol. 2, pp. 254-260, 2005. [35] P. Sommer, "Intrusion Detection Systems as Evidence," Computer Networks, vol. 31, pp. 2477-2487, 1999. [36] P. Stephenson, "The Application of Intrusion Detection Systems in a Forensic Environment," in Proceedings of the RAID 2000 conference, 2000. [37] S. T. King and P. M. Chen, "Backtracking Intrusions," in SOSP, New York, USA, 2003. [38] "How NTFS Works," Microsoft TechNet, 2003. [39] S. L. Garfinkel and A. Shelat, "Remembrance of Data Passed: A Study of Disk Sanitization Practices," IEEE Security & Privacy, 2003.
|