1 |
Alessandro Guarino, "Digital Forensics as a Big Data Challenge," StudioAG, ISSE 2013 Securing Electronic Business Processes, Vol.6, pp.197-203, 2013.
|
2 |
Yinghua Guo, Jill Slay, and Jason Beckett, "Validation and verification of computer forensic software, toolsdSearching Function," Digital Investigation, Vol.6, pp.S12-S22, Sep., 2009.
DOI
|
3 |
Karen Kent, Suzanne Chevalier, Tim Grance, and Hung Dang, "Guide to Integrating Forensic Techniques into Incident Response," NIST SP800-86 Notes, Aug., 2006.
|
4 |
MITRE [Internet], https://cyboxproject.github.io.
|
5 |
Eoghan Casey, Greg Back, and Sean Barnum, "Leveraging CybOX to standardize representation and exchange of digital forensic information," Digital Investication, Vol.12, pp.102-110, Mar., 2015.
DOI
|
6 |
Eoghan Casey, Greg Back, Sean Barnum [Internet], https://github.com/DFAX/dfax.
|
7 |
Mandiant [Internet], http://www.openioc.org.
|
8 |
Simson Garfinkel, "Digital forensics XML and the DFXML toolset," Vol.8. pp.161-174. Feb., 2012.
DOI
|
9 |
Simson Garfinkel [Internet], https://github.com/simsong/dfxml.
|
10 |
Stephen Larson, "Book Review: The Basics of Digital Forensics: The Primer For Getting Started in Digital Forensics," Journal of Digital Forensics, Security and Law, Vol.9, No.1, pp.83-85, 2014.
|