1 |
H. Carvey. (2013). HowTo: Determine User Access To Files. http://windowsir.blogspot.kr/2013/07/howto-determine-user-access-to-files.html
|
2 |
D. Y. Won. (2015). A Study on Digital Evidence Collection Procedures Improvement. Journal of Digital Forensics, 9(2), 27-41.
DOI
|
3 |
G. Palmer. (2001). A Road Map for Digital Forensic Research. technical report DTR-T001-0, Utica, New York
|
4 |
C. Boyd & P. Forster. (2004). Time and Date issues in forensic computing - a case study. Digital Investigation, 1(1), 18-23.
DOI
|
5 |
B. Carrier. (2005). File System Forensic Analysis. Addison-Wesley, 340-341.
|
6 |
R. Russon & Y. Fledel. (2004). NTFS Documentation, Chapter 3. NTFS files:$LogFile, pp. 38-42. http://dubeyko.com/development/FileSystems/NTFS/ntfsdoc.pdf
|
7 |
S. Neuner et al. (2016). Time is on my side: Stegan graphy in filesystem metadata. Digital Investigation, 18(2016), S76-S86.
DOI
|
8 |
H. J Yoon. (2018). A study on user behavior trackingusing $UsnJrnl. Doctoral dissertation, Graduate School of Seoul National University.
|
9 |
J. H. Oh. (2013). NTFS Log Tracker. Forensic Insight ; Digitalforensic community in korea.
|
10 |
M. S. Park. (2012). Record File Carving Technique for Efficient File Recovery in Digital Forensic Investigation. Graduate School of Information Security Korea University.
|