1 |
Sungsu Lim, "The Research on File Carving Method of SQLite Database", 2010 The Workshop of Digital Forensics. pp.79-82, 2010.
|
2 |
Digambar Povar, V.K. Bhadran, "Forensic Data Carving", Digital Forensics and Cyber Crime, Vol.53, pp.137-148, 2011.
DOI
|
3 |
M.I Cohen, "Advanced carving techniques", Digital Investigation, Vol.4, Issues.3-4, pp.119-128, 2007.
DOI
ScienceOn
|
4 |
Junghoon Oh, "A Study for recovering Deleted Information of Web Browser", 2010 The Workshop of Digital Forensics. pp.79-82, 2010.
|
5 |
Robert Beverly, "Forensic carving of network packets and associated data structures", Digital Investigation, Vol.8, pp.78-89, 2011.
DOI
ScienceOn
|
6 |
Sangjin Lee, "Introduction to Digital Forensics", Eroon. pp.180-181, 2010.
|
7 |
http://www.getdata.com/, GetData
|
8 |
Junghoon Oh "Advanced evidence collection and analysis of web browser activity", Digital Investigation, Vol.8, pp.62-70, 2011.
DOI
ScienceOn
|
9 |
http://www.tcpdump.org/, TCPDUMP&LiBPCAP
|
10 |
http://www.wireshark.org/, WIRESHARK
|
11 |
Brian Carrier, "File System Forensic Analysis", Addison Wesley Professional, 2005.
|
12 |
Jinkook Kim, "A Framework for Data Recovery and Analysis from Digital Forensics Point of View", Korea Information Processing Society. Vol.17-C, No.5, pp.391-398, 2010.
과학기술학회마을
DOI
ScienceOn
|