15.01.2014 Views

An Ontology for Digital Forensics in IT Security Incidents - OPUS

An Ontology for Digital Forensics in IT Security Incidents - OPUS

An Ontology for Digital Forensics in IT Security Incidents - OPUS

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

86 BIBLIOGRAPHY<br />

[Carrier, 2012c] Carrier, B. D. (2012c). Tsk tool overview - sleuthkitwiki.<br />

http://wiki.sleuthkit.org/<strong>in</strong>dex.php?title=TSK_Tool_Overview.<br />

[last accessed:17.02.2013]. 4.3.1<br />

[Carrier and Grand, 2004] Carrier, B. D. and Grand, J. (2004). A hardwarebased<br />

memory acquisition procedure <strong>for</strong> digital <strong>in</strong>vestigations. Digit.<br />

Investig., 1(1):5060. 4.1.2.2<br />

[Cohen, 2012] Cohen, M. (2012). Pyag. http://source<strong>for</strong>ge.net/<br />

projects/pyflag/, http://www.<strong>for</strong>ensicswiki.org/wiki/PyFlag. [last<br />

accessed:17.02.2013]. 2<br />

[Council and Institute, 1998] Council, I. T. I. and Institute, A. N. S.<br />

(1998). American National Standard <strong>for</strong> In<strong>for</strong>mation Technology: AT<br />

Attachment-3 Interface <strong>for</strong> (ATA-3). American National Standards Institute.<br />

4.1.2.1<br />

[Cytoscape Consortium, 2012] Cytoscape Consortium (2012). Cytoscape:<br />

<strong>An</strong> open source plat<strong>for</strong>m <strong>for</strong> complex network analysis and visualization.<br />

http://www.cytoscape.org/. [last accessed:17.02.2013]. 5.2.5<br />

[Davis, 2008] Davis, N. (2008). Live memory acquisition <strong>for</strong> w<strong>in</strong>dows operat<strong>in</strong>g<br />

systems: Tools and techniques <strong>for</strong> analysis. Technical report, Eastern<br />

Michigan University. 4.1.2.2<br />

[De Smet, 2009] De Smet, P. (2009). Semi-automatic <strong>for</strong>ensic reconstruction<br />

of ripped-up documents. In Document <strong>An</strong>alysis and Recognition, 2009.<br />

ICDAR '09. 10th International Conference on, pages 703 707. 1<br />

[Ellson et al., 2013] Ellson, J., Gansner, E., Hu, Y., Bilg<strong>in</strong>, A., and Perry,<br />

D. (2013). Graphviz | graphviz - graph visualization software. http:<br />

//www.graphviz.org/. [last accessed:17.02.2013]. 5.2.7<br />

[Ewert and Schultz, 1992] Ewert, R. A. and Schultz, S. M. (1992). Automatic<br />

hard disk bad sector remapp<strong>in</strong>g. 4.1.2.1<br />

[Farrell, 2009] Farrell, P. F. J. (2009). A framework <strong>for</strong> automated digital<br />

<strong>for</strong>ensic report<strong>in</strong>g. Master's thesis, Naval Postgraduate School Monterey.<br />

2<br />

[Federal Bureau of Investigation, 2011] Federal Bureau of Investigation<br />

(2011). FBI International Cyber R<strong>in</strong>g That Infected Millions<br />

of Computers Dismantled. http://www.fbi.gov/news/stories/2011/<br />

november/malware_110911. [last accessed:17.02.2013]. 4.2.3.2<br />

[Garnkel, 2009] Garnkel, S. (2009). Automat<strong>in</strong>g disk <strong>for</strong>ensic process<strong>in</strong>g<br />

with sleuthkit, xml and python. In Systematic Approaches to<br />

<strong>Digital</strong> Forensic Eng<strong>in</strong>eer<strong>in</strong>g, 2009. SADFE '09. Fourth International<br />

IEEE Workshop on, pages 73 84. 2

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!