1 |
B. Carrier, "Defining digital forensic examination and analysis tools," Int. J. of Digital Evidence, vol. 1, issue 4, 2002, pp. 1-10.
|
2 |
M. Reith, C. Carr, and G. Gunsch, "An examination of digital forensic models," Int. J. of Digital Evidence. vol. 1, issue 3, Aug. 2010, pp. 1-12.
|
3 |
H. Berghel, "Hiding Data, Forensics, and Anti-Forensics," Communications of the ACM, vol. 50, no. 4, 2007, pp. 15-20.
DOI
|
4 |
R. Harris, "Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem," The 6th Annual Digital Forensic Research Workshop, Lafayette, IN, Aug. 2006, pp. 44-49.
|
5 |
P. Moon, "On the Availability of Anti-Forensic Tools for Android Smartphones," J. of the Korea Institute of Electronic Communication Sciences, vol. 8, no. 6, 2013, pp. 855-861.
DOI
|
6 |
G. Lee, "A Study on Influence of Korea-EU FTA Ratification upon Legal Service and Forensic Investigation," J. of the Korea Institute of Electronic Communication Sciences, vol. 6, no. 5, 2011, pp. 684-688.
|
7 |
G. Lee, "A Study on Casino Embezzlement Incident Analysis and Forensic Investigation Technology," J. of the Korea Institute of Electronic Communication Sciences, vol. 6, no. 1, 2011, pp. 105-110.
과학기술학회마을
|