15.01.2014 Views

An Ontology for Digital Forensics in IT Security Incidents - OPUS

An Ontology for Digital Forensics in IT Security Incidents - OPUS

An Ontology for Digital Forensics in IT Security Incidents - OPUS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

48 CHAPTER 6. FORENSIC ONTOLOGY<br />

reg:hasHive<br />

reg:root<br />

rdfs:doma<strong>in</strong><br />

rdfs:range<br />

rdfs:doma<strong>in</strong><br />

rdfs:range<br />

reg:Registry<br />

reg:Hive<br />

reg:hasSubKey<br />

reg:keyname<br />

rdfs:range<br />

rdfs:doma<strong>in</strong><br />

rdfs:doma<strong>in</strong><br />

rdfs:doma<strong>in</strong><br />

reg:Key<br />

reg:keystate<br />

reg:hasValue<br />

reg:valuestate<br />

reg:value<br />

reg:key<br />

rdfs:range<br />

rdfs:doma<strong>in</strong><br />

rdfs:range<br />

rdfs:range<br />

rdfs:doma<strong>in</strong><br />

rdfs:doma<strong>in</strong><br />

rdfs:doma<strong>in</strong><br />

rdfs:doma<strong>in</strong><br />

reg:State<br />

reg:Value<br />

reg:type<br />

rdfs:range<br />

reg:ValueType<br />

Figure 6.7: Registry

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!