15.01.2014 Views

An Ontology for Digital Forensics in IT Security Incidents - OPUS

An Ontology for Digital Forensics in IT Security Incidents - OPUS

An Ontology for Digital Forensics in IT Security Incidents - OPUS

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

BIBLIOGRAPHY 87<br />

[Garnkel, 2010] Garnkel, S. L. (2010). <strong>Digital</strong> <strong>for</strong>ensics research: The<br />

next 10 years. <strong>Digital</strong> Investigation, 7, Supplement(0):S64 S73. The<br />

Proceed<strong>in</strong>gs of the Tenth <strong>An</strong>nual DFRWS Conference. 1, 2<br />

[Gephi Consortium, 2012] Gephi Consortium (2012). Gephi, an open source<br />

graph visualization and manipulation software. https://gephi.org/.<br />

[last accessed:17.02.2013]. 5.2.3<br />

[Gruber, 2009] Gruber, T. (2009). <strong>Ontology</strong>. http://tomgruber.org/<br />

writ<strong>in</strong>g/ontology-def<strong>in</strong>ition-2007.htm. [last accessed:17.02.2013]. 5.1<br />

[Harris, 2006] Harris, R. (2006). Arriv<strong>in</strong>g at an anti-<strong>for</strong>ensics consensus:<br />

Exam<strong>in</strong><strong>in</strong>g how to dene and control the anti-<strong>for</strong>ensics problem. <strong>Digital</strong><br />

Investigation, 3, Supplement(0):44 49. The Proceed<strong>in</strong>gs of the<br />

6th <strong>An</strong>nual <strong>Digital</strong> Forensic Research Workshop (DFRWS '06).<br />

4.2.3.3<br />

[Hitzler et al., 2008a] Hitzler, P., Krötzsch, M., Rudolph, S., and Sure, Y.<br />

(2008a). Semantic Web, chapter 2, pages 1532. Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong><br />

Heidelberg. Struktur mit XML. 5.1.3<br />

[Hitzler et al., 2008b] Hitzler, P., Krötzsch, M., Rudolph, S., and Sure, Y.<br />

(2008b). Semantic Web, chapter 3, pages 3488. Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong><br />

Heidelberg. E<strong>in</strong>fache Ontologien <strong>in</strong> RDF und RDF Schema. 5.1.3<br />

[Hitzler et al., 2008c] Hitzler, P., Krötzsch, M., Rudolph, S., and Sure, Y.<br />

(2008c). Semantic Web, chapter 5, pages 123159. Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong><br />

Heidelberg. Ontologien <strong>in</strong> OWL. 5.1.3<br />

[Huynh et al., 2003] Huynh, C., de Chazal, P., McErlean, D., Reilly, R.,<br />

Hannigan, T., and Fleury, L. (2003). Automatic classication of shoepr<strong>in</strong>ts<br />

<strong>for</strong> use <strong>in</strong> <strong>for</strong>ensic science based on the fourier trans<strong>for</strong>m. In Image<br />

Process<strong>in</strong>g, 2003. ICIP 2003. Proceed<strong>in</strong>gs. 2003 International Conference<br />

on, volume 3, pages III 56972 vol.2. 1<br />

[IADT Chicago, 2011] IADT Chicago (2011). Famous computer <strong>for</strong>ensics<br />

case | iadt - chicago. http://www.iadt.edu/Student-Life/IADT-Buzz/<br />

January-2011/Most-Famous-Case-Solved-Computer-<strong>Forensics</strong>. [last<br />

accessed: 17.02.2013]. 4.1.1<br />

[Kruse and Heiser, 2001] Kruse, W. and Heiser, J. (2001). Computer<br />

<strong>Forensics</strong>: Incident Response Essentials. Pearson Education. 4.1, 4.1.2,<br />

4.1.2, 4.2.3.3<br />

[Manson et al., 2007] Manson, D., Carl<strong>in</strong>, A., Ramos, S., Gyger, A., Kaufman,<br />

M., and Treichelt, J. (2007). Is the open way a better way? digital<br />

<strong>for</strong>ensics us<strong>in</strong>g open source tools. In System Sciences, 2007. HICSS 2007.<br />

40th <strong>An</strong>nual Hawaii International Conference on, page 266b. 4.3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!