1 |
B. Carrier. 'Defining Digital Forensics Examination and Analysis Tools,' In Digital Research Workshop II, 2002
|
2 |
D. Farmer and W. Venema, 'Forensic Computer Analysis: An Introduction,' Dr. Dobbs Journal, Jul. 2001
|
3 |
최종호, 조성배 '침입탐지 시스템을 위한 은닉 마르코프 모델의 적용,' 한국정보과학회논문지, 28(6), pp. 429-438, 2001
|
4 |
L. R. Rabiner, 'A tutorial on hidden Markov models and selected applications in speech recognition,' Proc. of the IEEE, vol. 77, no. 2, pp. 257-286, Feb. 1989
DOI
ScienceOn
|
5 |
Intel Corporation, 64 and IA-32 Architecture Software Developer's Manual, http://www.intel.com/ design/pentium4/manuals/index_n ew.htm, 2006
|
6 |
L. Garber, 'EnCase: A Case Study in Computer-Forensic Technology,' IEEE Computer Magazine, Jan., 2001
|
7 |
libdisasm x86 Disassembler Library, http://bastard.sourceforge.net/ libdisasm.html
|
8 |
B. Carrier, The Sleuth Kit, http:// www.sleuthkit.org/sleuthkit, 2006
|
9 |
M. Schultz, E. Eskin, E. Zadok, and S. Stolfo, 'Data Mining Methods for Detection of New Malicious Executables,' Proc. of IEEE Symposium on Security and Privacy, pp. 38-49, 2001
|
10 |
J. Park, M. Kim, B. Noh, J. Joshi, 'A Similarity based Technique for Detecting Malicious Executable files for Computer Forensics,' IEEE International Conf. on IRI, Sep. 2006
|
11 |
K. McLaughlin, 'Hacker Sophistication Outpacing Forensics,' Dr. Dobbs Journel, Aug. 2006
|
12 |
B. Carrier. 'Performing an autopsy examination on FFS and EXT2FS partition images: An Introduction to TCTUTILs and the Autopsy Forensic Browser,' In Digital Research Workshop II, 2002
|
13 |
이석봉, 박준형, 김민수, 노봉남, '컴퓨터 포렌 식스 관점에서 파일 지스러기 영역의 활용방법 연구,' 한국정보과학회 학술발표논문집, pp. 859-861, Oct. 2003
|
14 |
W. Venema, 'File Discovery Techniques,' Dr. Dobbs Journal, Jul. 2001
|