1 |
https://www.cftt.nist.gov/
|
2 |
http://dftt,sourceforge.net/
|
3 |
http://www.toptenreviews.com/software/backup-recovery/best-data-recoverysoftware/
|
4 |
Min-Seo Kim and Sang-jin Lee, "Development of Windows forensic tool for verifying a set of data," Journal of the Korea Institute of Information Security & Cryptology, Vol. 25, No. 6, pp. 1421-1433, Dec, 2015.
DOI
|
5 |
Jaeung Namgung, Ilyoung Hong, Jungheum Park and Sangjin Lee, "A research for partition recovery method in a forensic perspective," Journal of the Korea Institute of Information Security & Cryptology, Vol. 23, No. 4, pp. 655-666, Aug, 2013.
DOI
|
6 |
Guo, Yinghua, Jill Slay, and Jason Beckett. "Validation and verification of computer forensic software tools-Searching Function," Digital investigation, Vol. 6, pp. 12-22, Sep, 2009.
DOI
|
7 |
Beckett, Jason, and Jill Slay. "Digital forensics: Validation and verification in a dynamic work environment," System Sciences 2007 HICSS 2007 40th Annual Hawaii International Conference on IEEE, pp. 266-266, Jan, 2007.
|
8 |
Nikkel, Bruce J. "Forensic analysis of GPT disks and GUID partition tables." Digital Investigation, Vol. 6.1, pp. 39-47, Sep, 2009.
DOI
|