Friday 26 October 2012

1. Carrier, B. and Grand, J. A hardware-based memory acquisition procedure
for digital investigations. Digital Investigation 1, 1 (Feb. 2004).
2. Carrier, B. and Spafford, E. Automated digital evidence target definition
using outlier analysis and existing evidence. In Proceedings of the
2005 Digital Forensics Research Workshop.
3. Chin, Y., Roussev, V., Richard III, G.G. and Gao, Y. Content-based
image retrieval for digital forensics. In Proceedings of the International
Conference on Digital Forensics (IFIP 2005).
4. de Vel, O.Y., Anderson, A., Corney, M. and Mohay, G.M. Mining
email content for author identification forensics. SIGMOD Record 30,
4 (2001).
5. Digital Evidence Overload: Scalability and Automation. Breakout sessions
at The 5th Annual Digital Forensic Research Workshop (Aug.
17–18, 2005, New Orleans, LA).
6. Kenneally, E. and Brown, C. Risk sensitive digital evidence collection.
Digital Investigation 2, 2 (June 2005).
7. Novak, J., Raghavan, P. and Tomkins, A. Anti-aliasing on the Web. In
Proceedings of the 13th International Conference on the World Wide Web,
2004.
8. Pal, A., Shanmugasundaram, K. and Memon, N. Automated reassembly
of fragmented images. IEEE International Conference on Acoustics,
Speech, and Signal Processing, 2003.
9. Richard III, G.G. and Roussev, V. Scalpel: A frugal, high-performance
file carver. In Proceedings of the 2005 Digital Forensics Research Workshop.
10. Roussev, V. and Richard III, G.G. Breaking the performance wall: The
case for distributed digital forensics. In Proceedings of the 2004 Digital
Forensics Research Workshop.

No comments:

Post a Comment