1 |
Keith J. Jones, 'incident response: Performing Investigations on a Live Host', computer forensic consultant for Foundstone, The Magazine of Usenix & Sage, pp. 26-31. November, 2001
|
2 |
최운호, '종합 침해사고 대응시스템의 전체 구성', 금융결제원
|
3 |
Vicka Corey, Charles Peterman, Sybil Shearin, Michael S.Greenberg, and James Van Bokkelen, 'Network Forensics Analysis', Sandstorm Enterprises, IEEE Internet Computing Magazine, November 2002
|
4 |
Renaud Deraison and Jordan Hrycaj, 'nessus: the free network security scanner', Nessus project, The Magazine of Usenix & Sage, pp. 45-48, November, 2000
|
5 |
Eoghan Casey, 'HANDBOOF OF Computer Crime Investigation', ACDEMIC PRESS, 2003
|
6 |
한민옥, 국가 사이버테러 대응체계 가동', 디지털타임스, 16, December. 2003
|
7 |
Rik Rarrow, 'Correlating Log File Entries', The Ohio State University Incident Response Team, The Magazine of Usenix & Sage, pp. 38-44, November, 2000
|
8 |
Henry B. Wolfe, 'Electronic Evidence Gathering'. DEAKIN UNIV. Seventh Australasian Conference on Information Security and Privacy, 2002
|
9 |
최운호, '국가 사이버상황실(CyberWaroom) 구축연구', 금융결제원
|
10 |
Allan H. Magee, Michael J. Hittel, 'Securing and preserving the scene of an electrical accident', GM Worldwide Facilities Member, Industrial and Commercial Power Systems Technical Conference. IEEE, 2001
|
11 |
Kulesh Shanmugasundaram, Nasir Memon, 'ForNet:A Distributed Forensic Network', Polytechnic UNIV, Digital Forensic Research Workshop, 2002
|
12 |
Melisa LaBancz, 'Network Forensics', networkSecurity.com, IT Journalist, April, 2002
|
13 |
Liu Jiqiang, Han Zhen, Lan Zengwei. 'Secure audit logs server to support computer forensics in criminal nvestigations', Department of Computer Science, Northen Jiaotong University, Proceeding of IEEE TENCON, 2002
|
14 |
Brad Powell, forensics lite', Sun Microsystems, The Magazine of Usenix & Sage, pp. 32-42, November, 2001
|
15 |
J, Philip Craiger, Alex Nicoll, Eline Burnham, 'An Applied Cource in Network Forensics', Department of Computer Science & Nebraska University Consortium for Information Assurance, Secure and Dependable Systems Workshop, September 23-25, 2002
|
16 |
Stephen Northcutt, Mark Cooper, Matt Fearnow, Karen Frederick, 'Intrusion Signatures and Analysis' New Riders, January 2001
|