1 |
Simon Byers, "Information leakage caused by hidden data in published documents", IEEE Security & Privacy, Vol.2, No.2, pp.23-27, 2004.
DOI
ScienceOn
|
2 |
A. Castiglionea, A. De Santisa and C. Sorienteb, "Taking advantages of a disadvantage: Digital forensics and steganography using document metadata", The Journal of Systems and Software, Volu.80, Issue 5, pp.750-764, May, 2007.
DOI
ScienceOn
|
3 |
Simson L. Garfinkel and James J.Migletz, "New XML-Based Files Implications for Forensics", IEEE Security & Privacy, Vol.7, Issue 2, pp.38-44, 2009.
DOI
ScienceOn
|
4 |
Park Jungheum and Lee Sangjin, "Forensic investigation of Microsoft PowerPoint files", Digital Investigation 6(1-2), pp.16-24, 2009.
DOI
ScienceOn
|
5 |
Aniello Castiglione, Bonaventura D'Alessio, Alfredo De Santis and Francesco Palmieri, "New Steganographic Techniques for the OOXML File Format", Availability, Reliability and Security for Business, Enterprise and Health Information Systems (C), LNCS Vol.6908, pp.344-358, 2011.
|
6 |
Microsoft Corporation, Standard ECMA-376, Office Open XML file formats. 3rd edition, 2011.
|
7 |
Zhangjie Fu, Xingming Sun, Yuling Liu and Bo Li, "Forensic investigation of OOXML format documents", Digital Investigation, Vol.8, Issue 1, pp.48-55, July, 2011.
DOI
ScienceOn
|
8 |
Microsoft Corporation, "XML file name extensions in Office 2010", URL : http://technet.microsoft.com/en-us/library/cc179191.aspx, June, 2010.
|