1 |
Sundresan Perumal, Digital Forensic Model Based On Malaysian Investigation Process, International Journal of Computer Science and Network
|
2 |
Ricci S.C. Ieong, FORZA - Digital forensics investigation framework that incorporate legal issues, Digital Investigation, Volume 3, Supplement 1, The Proceedings of the 6th Annual Digital Forensic Research Workshop (DFRWS '06), 2006
|
3 |
Seeamus O CiardhuAain, An Extended Model of Cybercrime Investigations, International Journal of Digital Evidence, Volume 3, Issue 1, 2004
|
4 |
Mark Reith, Clint Carr, Gregg Gunsch, An Examination of Digital Forensic Models, International Journal of Digital Evidence, Volume 1, Issue 3, 2002
|
5 |
DFRWS TECHNICAL REPORT-A Road Map for Digital Forensic Research, 2001
|
6 |
Eoghan Cesay, Digital Evidence And Computer Crime-Forensic Science Computers And The Internet 2nd edtion, Elsevier, 2004
|
7 |
Warren G Kruse, Jay Heiser, Computer Forensics: Incident Response Essentials, Addison-Wesley Professional, 2001
|
8 |
Timothy Palmbach, Marilyn Miller, Henry Lee, Henry Lee's Crime Scene Handbook. San Diego, Academic Press, 2001
|
9 |
S. von Solms, C. Louwrens, C. Reekie and T. Grobler, A Control Framework for Digital Fornesics, Advances in Digital Forensics II. IFIP Advances in Information and Communication Technology, 2006, pp.343-355
|
10 |
Georgios Pangalos and Vasilios Katos, Information Assurance and Forensic Readiness, Computer Science Next Generation Society. Technological and Legal Issues, LNCS, Social Informatics and Telecommunications Engineering, 2010, Volume 26, Part 6
|
11 |
T. Grobler, and B. Louwrens, "Digital forensic readiness as a component of information security best practice", in IFIP International Federation for Information Processing, Vol. 232, New Approaches for Security, Privacy and Trust in Complex Environments, Springer, 2007, pp. 13-24
|
12 |
Pangalos G. Ilioudis, C. Pagkalos, I. The Importance of Corporate Forensic Readiness in the Information Security Framework, 2010 19th IEEE International Workshop on Infrastructures for Collaborative Enterprises (WETICE), June 2010, pp. 12-16
|
13 |
Cabinet Office of United Kingdom, HMG Security Policy Framework ver6.0, May 2011
|
14 |
개인정보보호법, 제정 2011.3.29 법률 제10465호
|
15 |
이창훈, 임경수, "국내 환경을 고려한 디지털 포렌식 조사 모델 정립 방안," 한국정보처리학회 추계학술발표대회 논문집 제18권, 제2호, 2011.11
|
16 |
경찰청, 디지털 포렌식 증거 처리 가이드라인, 2008
|
17 |
대검찰청, 디지털증거압수수색모델, 2009
|