An Ontology for Digital Forensics in IT Security Incidents - OPUS
An Ontology for Digital Forensics in IT Security Incidents - OPUS
An Ontology for Digital Forensics in IT Security Incidents - OPUS
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
BIBLIOGRAPHY 87<br />
[Garnkel, 2010] Garnkel, S. L. (2010). <strong>Digital</strong> <strong>for</strong>ensics research: The<br />
next 10 years. <strong>Digital</strong> Investigation, 7, Supplement(0):S64 S73. The<br />
Proceed<strong>in</strong>gs of the Tenth <strong>An</strong>nual DFRWS Conference. 1, 2<br />
[Gephi Consortium, 2012] Gephi Consortium (2012). Gephi, an open source<br />
graph visualization and manipulation software. https://gephi.org/.<br />
[last accessed:17.02.2013]. 5.2.3<br />
[Gruber, 2009] Gruber, T. (2009). <strong>Ontology</strong>. http://tomgruber.org/<br />
writ<strong>in</strong>g/ontology-def<strong>in</strong>ition-2007.htm. [last accessed:17.02.2013]. 5.1<br />
[Harris, 2006] Harris, R. (2006). Arriv<strong>in</strong>g at an anti-<strong>for</strong>ensics consensus:<br />
Exam<strong>in</strong><strong>in</strong>g how to dene and control the anti-<strong>for</strong>ensics problem. <strong>Digital</strong><br />
Investigation, 3, Supplement(0):44 49. The Proceed<strong>in</strong>gs of the<br />
6th <strong>An</strong>nual <strong>Digital</strong> Forensic Research Workshop (DFRWS '06).<br />
4.2.3.3<br />
[Hitzler et al., 2008a] Hitzler, P., Krötzsch, M., Rudolph, S., and Sure, Y.<br />
(2008a). Semantic Web, chapter 2, pages 1532. Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong><br />
Heidelberg. Struktur mit XML. 5.1.3<br />
[Hitzler et al., 2008b] Hitzler, P., Krötzsch, M., Rudolph, S., and Sure, Y.<br />
(2008b). Semantic Web, chapter 3, pages 3488. Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong><br />
Heidelberg. E<strong>in</strong>fache Ontologien <strong>in</strong> RDF und RDF Schema. 5.1.3<br />
[Hitzler et al., 2008c] Hitzler, P., Krötzsch, M., Rudolph, S., and Sure, Y.<br />
(2008c). Semantic Web, chapter 5, pages 123159. Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong><br />
Heidelberg. Ontologien <strong>in</strong> OWL. 5.1.3<br />
[Huynh et al., 2003] Huynh, C., de Chazal, P., McErlean, D., Reilly, R.,<br />
Hannigan, T., and Fleury, L. (2003). Automatic classication of shoepr<strong>in</strong>ts<br />
<strong>for</strong> use <strong>in</strong> <strong>for</strong>ensic science based on the fourier trans<strong>for</strong>m. In Image<br />
Process<strong>in</strong>g, 2003. ICIP 2003. Proceed<strong>in</strong>gs. 2003 International Conference<br />
on, volume 3, pages III 56972 vol.2. 1<br />
[IADT Chicago, 2011] IADT Chicago (2011). Famous computer <strong>for</strong>ensics<br />
case | iadt - chicago. http://www.iadt.edu/Student-Life/IADT-Buzz/<br />
January-2011/Most-Famous-Case-Solved-Computer-<strong>Forensics</strong>. [last<br />
accessed: 17.02.2013]. 4.1.1<br />
[Kruse and Heiser, 2001] Kruse, W. and Heiser, J. (2001). Computer<br />
<strong>Forensics</strong>: Incident Response Essentials. Pearson Education. 4.1, 4.1.2,<br />
4.1.2, 4.2.3.3<br />
[Manson et al., 2007] Manson, D., Carl<strong>in</strong>, A., Ramos, S., Gyger, A., Kaufman,<br />
M., and Treichelt, J. (2007). Is the open way a better way? digital<br />
<strong>for</strong>ensics us<strong>in</strong>g open source tools. In System Sciences, 2007. HICSS 2007.<br />
40th <strong>An</strong>nual Hawaii International Conference on, page 266b. 4.3