1 |
Encase, http://www.encase.com
|
2 |
David Litchfield, 'Oracle Forensics Part 1: Dissecting the Redo Logs,' Technical Report, NGSSoftware Insight Security Research(NlSR), March, 2007
|
3 |
David Litchfield, 'Oracle Forensics Part 5: Finding Evidence of Data Theft in the Absence of Auditing,' Technical Report, NGSSoftware Insight Security Research(NISR), August 2007
|
4 |
Patrick Stahlberg, Gerome Miklau, Neil Levine, 'Threats to privacy in the forensic analysis of database systems,' ACM SIGMOD'07, pp.9l-102, 2007
|
5 |
Gary L Palmer, 'A Road Map for Digital Forensic Research,' Technical Report DTR-T0010-01, Digital Forensic Research Workshop(DFRWS), 2001
|
6 |
FTK, http://www.accessdata.com
|
7 |
David Litchfield, 'Oracle Forensics Part 4: Live Response,' Technical Report, NGSSoftware Insight Security Research(NISR), April 2007
|
8 |
Nicole Lang Beebe and Jan Guynes Clark, 'A hierarchical, objectives-based framework for the digital investigations process,' Digital Investigation, Vol.2, No.2, pp.l47-167, 2005
DOI
ScienceOn
|
9 |
George Mohay, Alison Anderson, Byron Collie, Oliver de Vel and Rodney McKemmish, 'Computer and Intrusion Forensics,' p. 3, Artech House, 2003
|
10 |
Felix Freiling, Heiko Mantel, 'Towards Automating Analysis in Computer Forensics,' pp.21-56, RWTH Aachen University, 2006
|
11 |
Ed Crowley, 'Computer Crime and Forensics,' http://isacahouston.org/
|
12 |
Gregory S. Miles, 'Computer Forensics: A Critical Process in your incident response plan,' BlackHat Europe Briefings, 2001. htto.z/www.blackhat.corn/
|
13 |
Venansius Baryamureeba, Florence Tushabe, 'The Enhanced Digital Investigation Process Model,' Asian Journal of Information Technology, Vol.5, No.7, pp.790-794, 2006
|
14 |
이규안, 박대우, 신용태, '포렌식 자료의 무결성 확보를 위한 수사현장의 연계관리 방법 연구', 정보과학회 논문지, 제11권, 제6호, pp.175-184, 2006
과학기술학회마을
|
15 |
Kevvie Fowler, 'SQL Server Database Forensics,' Balckhat USA briefings and training 2007. http:// www.blackhat.com/
|
16 |
David Litchfield, 'Oracle Forensics Part 6: Examining Undo Segments, Flashback and the Oracle Recycle Bin,' Technical Report, NGSSoftware Insight Security Research (NISR), August 2007
|
17 |
David Litchfield, 'Oracle Forensics Part 2: Locating Dropped Objects,' Technical Report, NGSSoftware Insight Security Research(NISR), March 2007
|
18 |
Database Forensics, http://en.wikipedia.org/wiki/ Database_Forensics
|