1 |
Wikipedia, File System Fragmentation, https://en.wikipedia.org/wiki/File_system_fragmentation
|
2 |
Microsoft, Inside Windows NT Disk Defragmenting, http://mirrors.arcadecontrols.om/www.sysinternals.com/Information/DiskDefragmenting.html
|
3 |
Microsoft Drive Optimizer, https://en.ikipedia.rg/wiki/Microsoft_rive_ptimizer
|
4 |
Conlan, K., Baggili, I. and Breitinger, F., "Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy," Digital Investigation, Vol. 18, 2016, pp. S66-S75.
DOI
|
5 |
Hassan, N. A., and Hijazi, R., Data Hiding Techniques in Windows OS, Elsevier, 2017.
|
6 |
Cho, G.-S., "A New NTFS Anti-Forensic Technique for NTFS Index Entry," The J. of Korea Institute of Information, Electronics, and Communication Technology, Vol.8 No.4, 2015, pp. 327-337.
DOI
|
7 |
Berghel, H., Hoelzer, D., and Sthultz, M., "Data Hiding Tactics for Windows and Unix File Systems," Advances in Computers, vol. 74, 2008, pp. 1-17.
DOI
|
8 |
Huebner, E., Bem, D. and Wee, C. K., "Data Hiding in the NTFS File System," Digital Investigation, Vol. 3, Issue 4, 2006, pp. 211-226.
DOI
|
9 |
Karresand, M., Axelsson, S., and Dyrkolbotn, G., "Using NTFS Cluster Allocation Behavior to Find the Location of User Data," Digital Investigation, Vol. 29, 2019, pp. S51-S60.
DOI
|
10 |
Bahjat, A. and Jones, J., "Deleted file fragment dating by analysis of allocated neighbors," Digital Investigation 28, 2019, pp. S60-S67.
DOI
|
11 |
Carrier, B., File System Forensic Analysis, Addison-Wesley, 2005.
|
12 |
Cho, G. S., "A Maximum Data Allocation Rule for Anti-forensic Data Hiding Method in NTFS Index Record," Int. J. of Internet, Broadcasting and Communication, Vol.9, No.3, 2017, pp. 17-26.
DOI
|