An Ontology for Digital Forensics in IT Security Incidents - OPUS
An Ontology for Digital Forensics in IT Security Incidents - OPUS An Ontology for Digital Forensics in IT Security Incidents - OPUS
84 APPENDIX C. SCREENSHOTS
Bibliography [Adelstein, 2006] Adelstein, F. (2006). Live forensics: diagnosing your system without killing it rst. Commun. ACM, 49(2):6366. 1 [Aduna, 2012] Aduna (2012). openrdf.org: Home. http://www.openrdf. org/. [last accessed:17.02.2013]. 5.3.2, 7.5 [Altova, 2013] Altova (2013). Altova semanticworks - visual rdf and owl editor that autogenerates rdf/xml and n-triples. http://www. altova.com/products/semanticworks/rdf_owl_editor.html. [last accessed:17.02.2013]. 5.2.1 [Beckett, 2013] Beckett, D. (2013). Raptor rdf syntax library. http: //librdf.org/raptor/. [last accessed:17.02.2013]. 5.2.7 [Broekstra et al., 2002] Broekstra, J., Kampman, A., and Harmelen, F. v. (2002). Sesame: A generic architecture for storing and querying rdf and rdf schema. In Proceedings of the First International Semantic Web Conference on The Semantic Web, ISWC '02, pages 5468, London, UK, UK. Springer-Verlag. 5.3.2 [Carrier, 2012a] Carrier, B. (2012a). The sleuth kit. http://www. sleuthkit.org/sleuthkit/. [last accessed:17.02.2013]. 2, 4.3.1 [Carrier, 2003] Carrier, B. D. (2003). Open source digital forensics tools. @stake Research Report. 4.1.2, 4.1.2, 4.3 [Carrier, 2005] Carrier, B. D. (2005). File System Forensic Analysis. Addison-Wesley, 1 edition. 2, 4.2.1, 4.3.1 [Carrier, 2009] Carrier, B. D. (2009). Body le. http://wiki.sleuthkit. org/index.php?title=Body_file. [last accessed:17.02.2013]. 4.3.1 [Carrier, 2012b] Carrier, B. D. (2012b). The sleuth kit: File and volume system analysis. http://www.sleuthkit.org/sleuthkit/desc.php. [last accessed:17.02.2013]. 4.3.1 85
- Page 36 and 37: 34 CHAPTER 5. ONTOLOGY 5.1.1 Creati
- Page 38 and 39: 36 CHAPTER 5. ONTOLOGY Resource Des
- Page 40 and 41: 38 CHAPTER 5. ONTOLOGY to be Augsbu
- Page 42 and 43: 40 CHAPTER 5. ONTOLOGY Gephi and Cy
- Page 44 and 45: 42 CHAPTER 5. ONTOLOGY
- Page 46 and 47: 44 CHAPTER 6. FORENSIC ONTOLOGY for
- Page 48 and 49: 46 CHAPTER 6. FORENSIC ONTOLOGY pro
- Page 50 and 51: 48 CHAPTER 6. FORENSIC ONTOLOGY reg
- Page 52 and 53: 50 CHAPTER 6. FORENSIC ONTOLOGY 6.9
- Page 54 and 55: 52 CHAPTER 6. FORENSIC ONTOLOGY Par
- Page 56 and 57: 54 CHAPTER 6. FORENSIC ONTOLOGY
- Page 58 and 59: 56 CHAPTER 7. IMPLEMENTATION 7.3 RD
- Page 60 and 61: 58 CHAPTER 7. IMPLEMENTATION the co
- Page 62 and 63: 60 CHAPTER 7. IMPLEMENTATION 1 SELE
- Page 64 and 65: 62 CHAPTER 7. IMPLEMENTATION Anothe
- Page 66 and 67: 64 CHAPTER 7. IMPLEMENTATION 7.8 St
- Page 68 and 69: 66 CHAPTER 8. EVALUATION 6. The las
- Page 70 and 71: 68 CHAPTER 8. EVALUATION key (CTEMO
- Page 72 and 73: 70 CHAPTER 9. SUMMARY after some is
- Page 74 and 75: 72 APPENDIX A. EXTRACTION TOOL LIST
- Page 76 and 77: 74 APPENDIX A. EXTRACTION TOOL LIST
- Page 78 and 79: 76 APPENDIX B. FORENSIC TOOLS OUTPU
- Page 80 and 81: 78 APPENDIX C. SCREENSHOTS Figure C
- Page 82 and 83: 80 APPENDIX C. SCREENSHOTS Figure C
- Page 84 and 85: 82 APPENDIX C. SCREENSHOTS Figure C
- Page 88 and 89: 86 BIBLIOGRAPHY [Carrier, 2012c] Ca
- Page 90 and 91: 88 BIBLIOGRAPHY [Microsoft, 2010] M
- Page 92: 90 BIBLIOGRAPHY [W3C, 2004] W3C (20
Bibliography<br />
[Adelste<strong>in</strong>, 2006] Adelste<strong>in</strong>, F. (2006). Live <strong>for</strong>ensics: diagnos<strong>in</strong>g your system<br />
without kill<strong>in</strong>g it rst. Commun. ACM, 49(2):6366. 1<br />
[Aduna, 2012] Aduna (2012). openrdf.org: Home. http://www.openrdf.<br />
org/. [last accessed:17.02.2013]. 5.3.2, 7.5<br />
[Altova, 2013] Altova (2013). Altova semanticworks - visual rdf and<br />
owl editor that autogenerates rdf/xml and n-triples. http://www.<br />
altova.com/products/semanticworks/rdf_owl_editor.html. [last accessed:17.02.2013].<br />
5.2.1<br />
[Beckett, 2013] Beckett, D. (2013). Raptor rdf syntax library. http:<br />
//librdf.org/raptor/. [last accessed:17.02.2013]. 5.2.7<br />
[Broekstra et al., 2002] Broekstra, J., Kampman, A., and Harmelen, F. v.<br />
(2002). Sesame: A generic architecture <strong>for</strong> stor<strong>in</strong>g and query<strong>in</strong>g rdf and<br />
rdf schema. In Proceed<strong>in</strong>gs of the First International Semantic Web<br />
Conference on The Semantic Web, ISWC '02, pages 5468, London, UK,<br />
UK. Spr<strong>in</strong>ger-Verlag. 5.3.2<br />
[Carrier, 2012a] Carrier, B. (2012a). The sleuth kit. http://www.<br />
sleuthkit.org/sleuthkit/. [last accessed:17.02.2013]. 2, 4.3.1<br />
[Carrier, 2003] Carrier, B. D. (2003). Open source digital <strong>for</strong>ensics tools.<br />
@stake Research Report. 4.1.2, 4.1.2, 4.3<br />
[Carrier, 2005] Carrier, B. D. (2005). File System Forensic <strong>An</strong>alysis.<br />
Addison-Wesley, 1 edition. 2, 4.2.1, 4.3.1<br />
[Carrier, 2009] Carrier, B. D. (2009). Body le. http://wiki.sleuthkit.<br />
org/<strong>in</strong>dex.php?title=Body_file. [last accessed:17.02.2013]. 4.3.1<br />
[Carrier, 2012b] Carrier, B. D. (2012b). The sleuth kit: File and volume<br />
system analysis. http://www.sleuthkit.org/sleuthkit/desc.php. [last<br />
accessed:17.02.2013]. 4.3.1<br />
85