1 |
B. Carrier and E.H. Spafford, "Getting physical with the digital investigation process," International Journal of Digital Evidence, vol. 2, no. 2, Fall 2003.
|
2 |
M. Taylor, J. Haggerty, D. Gresty, and D. Lamb, "Forensic investigation of cloud computing systems," Network Security, vol. 2011, no. 3, pp. 4-10, Mar. 2011.
DOI
ScienceOn
|
3 |
H. Chung, J. Park, and S. Lee, "Digital forensic investigation of cloud storage services," Digital Investigation, vol. 9, no. 2, pp. 81-95, Nov. 2012.
DOI
ScienceOn
|
4 |
박기홍, 노시영, "클라우드 서비스에 대한 포렌식 측면의 수사 방법," 한국산업정보학회논문지, 17(1), pp. 39-46, 2012년 3월.
|
5 |
M. Taylor, J. Haggerty, D. Gresty, and R. Hegarty, "Digital evidence in cloud computing systems," Computer Law & Security Review, vol. 26, no. 3, pp. 304-308, May 2010.
DOI
ScienceOn
|
6 |
J. Mishra, S.K. Dash, and S. Dash, "Mobile-cloud: A framework of cloud computing for mobile application," Advances in Computer Science and Information Technology. Computer Science and Information Technology, vol. 86, pp. 347-356, 2012.
|
7 |
J. Dykstra and A.T. Sherman, "Acquiring forensic evidence from infrastructure-asa- service cloud computing: Exploring and evaluating tools, trust, and techniques," Digital Investigation, vol 9, Supplement, pp. S90-S98, Aug. 2012.
DOI
|
8 |
D. Barrett and G. Kipper, "Virtualization and forensics: A digital forensic investigator's guide to virtual environments," Syngress, 225 Wyman Street Waltham 02451 United States, pp. 197-209, 2010.
|
9 |
최지성, 전상준, 박정흠, 이상진, "디지털 포렌식 관점에서의 Mac OS X 사용흔적 분석," 한국정보처리학회 추계학술발표대회, 18(2), pp. 846-849, 2011년 6월.
|