1 |
H. Lee, S. Lee, and J. Lim, "Digital Forensics Technologies," Review of Korea Institute of Information Security and Cryptology, pp. 8-16, 2002.
|
2 |
N.A. Mutawa, I. Baggili, and A. Marrington, “Forensic Analysis of Social Networking Applications on Mobile Devices,” Journal of Digital Investigation, Vol. 9, Supplement, pp. S24-S33, 2012.
DOI
|
3 |
Y. Son and M. Chung, “Digital Forensics for Android Location Information using Hierarchical Clustering,” Journal of The Institute of Electronics and Information Engineers, Vol. 51, No. 6, pp. 143-151, 2014.
DOI
|
4 |
Window8 Forensic(1) Metro UI and Artifacts, http://download.ahnlab.com/kr/site/magazineAhn/ahn_201207.pdf (accessed July, 2012).
|
5 |
S. Jang and S. Lee, "Windows 8 Metro App from View Point of Digital Forensics," Proceeding of The Workshop of Digital Forensics, pp. 115-123, 2013.
|
6 |
J. Choi, D. Kim, and S. Lee, "Smartphone Messenger Data Collection and Analysis," Proceeding of The Workshop of Digital Forensics, pp. 3-10, 2013.
|
7 |
Y. Sun, "Geo-Location Forensic on Mobile Devices," The First International Conference on Digital Forensics and Investigation, pp. 1-8 2012.
|
8 |
A. Mahajan, M.S. Dahiya, and H.P. Sanghvi, “Forensic Analysis of Instant Messenger Applications on Android Devices,” International Journal of Computer Applications, Vol. 68, No. 8, pp.38-44, 2013.
DOI
|
9 |
D. Kim, J. Bang, and S. Lee, "Analysis of Smartphone-Based Location Information," Computer Science and Convergence is proceedings of the 3rd FTRA International Conference on Computer Science and its Applications and The 2011 FTRA World Convergence Conference, Lecture Notes in Electrical Engineering, Vol. 114, pp. 43-53, 2012.
|
10 |
S. Maus, H. Höfken, and M. Schuba, "Forensic Analysis of Geodata in Android Smartphones," Proceeding of International Conference on Cybercrime, pp.1-11, 2011.
|
11 |
L. Rokach and O. Maimon, Clustering Methods, Data mining and knowledge discovery handbook, Springer US, New York, 2005.
|
12 |
S.P. Lloyd, “Least Squares Quantization in PCM,” Information Theory, Institute of Electrical and Electronics Engineers Transactions on 28.2, Vol. 28, No. 2, pp. 129-137, 1982.
DOI
|
13 |
Kocsis and Richard N, Applied criminal psychology: A guide to forensic behavioral sciences, Charles C Thomas Publisher, Springfield, Illinois, 2009.
|
14 |
K. Kent, S. Chevalier, T. Grance and H. Dang, Guide to Integrating Forensic Techniques into Incident Response, National Institute of Standards and Technology Special Publication, Columbia, 2006.
|
15 |
J. Zhou, L. Liang, and L. Chen, “Geographic Profiling Based on Multi-point Centrography with K-means Clustering,” World Academy of Science, Engineering and Technology, Vol. 6, No. 61, pp. 875-878, 2012.
|
16 |
A. Iqba, A. Marrington, and I. Baggili, "Forensic Artifacts of the ChatON Instant Messaging Application," Systematic Approaches to Digital Forensic Engineering , 2013 Eighth International Workshop on institute of Electrical and Electronics Engineers, pp.1-6, 2013.
|
17 |
D. Quick, Forensic Analysis of Cloud Storage Client Data, Master of Science of University of South Australia, 2012.
|