User behavior analysis in No Disk System Configuration |
Kim, Deunghwa
(Center for Information Security Technologies(CIST), Korea University)
Namgung, Jaeung (Center for Information Security Technologies(CIST), Korea University) Park, Jungheum (Center for Information Security Technologies(CIST), Korea University) Lee, Sangjin (Center for Information Security Technologies(CIST), Korea University) |
1 | Dominik Birk, "Technical Challenges of Forensic Investigations in Cloud Computing Environments," Workshop on Cryptography and Security in Clouds, pp. 1-8, January 2011. |
2 | http://msdn.microsoft.com/en-us/library/ms912891(v=winembedded.5).aspx |
3 | http://en.wikipedia.org/wiki/Diskless_node |
4 | HDDLESS, "하드리스 시스템 소개," http://hddlesshn.com/base/m5/menu1.php?com_board_basic=read_form&com_ board_idx=11&com_board_page=&com_board_search_code=&com_board_search_value1=&com_board_search_value2=&left=1&topmenu=5, 2012년 6월. |
5 | http://blog.naver.com/ddparkid?Redirect=Log&logNo=20168646035 |
6 | RICHTECH KOREA, "하드리스 시스템," http://www.richtechkorea.com/Page/Business.php?page_num=1, 2013년 2월. |
7 | "VTOP_운영설명서(Version : 3.0.1).pdf," http://www.virtualtop.co.kr |
8 | "VTOP_설치설명서_Windows_7_Client.pdf," http://www.virtualtop.co.kr |
9 | 정일훈, 오정훈, 박정흠, 이상진, "IaaS 유형의 클라우드 컴퓨팅 서비스에 대한 디지털 포렌식 연구," 정보보호학회논문지, 21(6), pp. 55-65, 2011년 12월 과학기술학회마을 |