1 |
NIST, SP800-92, "Guide to Computer Security Log Management," pp. 28. Sept. 2006
|
2 |
Kwonyeop Kim, "A study on the Windows Registry as Digital Forensic," pp. 6, Feb. 2006
|
3 |
Dongeun Lee, "A study on the $LOGFILE of NTFS as Digital Forensic," pp. 37, Feb. 2007
|
4 |
log2timeline, "Current Input Modules," http://log2timeline.net/#input, 2013
|
5 |
Symantec, Internet Security Threat Report, vol 18, pp. 64. 2013
|
6 |
Suntae Park, "2013 Major Incident Cases and Response," 17th CONCERT, pp. 14, Dec. 2013
|
7 |
Seungjo Baek, Jongin Lim, "A study on the Forensic Readiness as an Effective Measure for Personal Information Protection," Internet and Information Security vol. 3, no. 2, 2012
|
8 |
Rowlingson, R. "A Ten Setp Process for Forensic Readiness, International Journal of Digital Evidence," vol. 2, no. 3, Winter 2004.
|
9 |
"2013 DATA BREACH INVESTIGATIONS REPORT," Verizon, pp. 55, 2013
|
10 |
Bruce Schneier, "Secrets & Lies," WILEY, US, Preface, 2000
|
11 |
Jonghyeon Kim and 4 others "Technical Trends of Cyber Security with Big Data," ETRI Cyber Security Technology Special Issue, pp. 23, 2013
|
12 |
KISA, "An Incident Analysis Process Guide," pp.14, 2010
|
13 |
NIST, SP800-61 Revision 2, "Computer Security Incident Handling Guide," pp. 21, Aug. 2012
|