An Ontology for Digital Forensics in IT Security Incidents - OPUS
An Ontology for Digital Forensics in IT Security Incidents - OPUS
An Ontology for Digital Forensics in IT Security Incidents - OPUS
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
88 BIBLIOGRAPHY<br />
[Microsoft, 2010] Microsoft (2010). Run and runonce registry keys (w<strong>in</strong>dows).<br />
http://msdn.microsoft.com/en-us/library/aa376977.aspx.<br />
[last accessed:17.02.2013]. 7.6.2<br />
[National Institute of Justice (U.S.), 2001] National Institute of Justice<br />
(U.S.) (2001). Electronic crime scene <strong>in</strong>vestigation: a guide <strong>for</strong> rst<br />
responders. NIJ guide. U.S. Dept. of Justice, Oce of Justice Programs,<br />
National Institute of Justice. 1, 4.1.2<br />
[National Institute of Justice (U.S.), 2004] National Institute of Justice<br />
(U.S.) (2004). Forensic exam<strong>in</strong>ation of digital evidence: a guide <strong>for</strong> law<br />
en<strong>for</strong>cement. NIJ special report. U.S. Dept. of Justice, Oce of Justice<br />
Programs, National Institute of Justice. 1, 4.1.2<br />
[Neo Technology, Inc., 2006] Neo Technology, Inc. (2006). The neo database<br />
a technology <strong>in</strong>troduction. Technical report. 2, 5.3.1<br />
[Neo Technology, Inc, 2013] Neo Technology, Inc (2013). Learn, develop,<br />
participate - neo4j: The world's lead<strong>in</strong>g graph database. http://www.<br />
neo4j.org/. [last accessed:17.02.2013]. 5.3.1, 5.3, 7.5<br />
[Noy and McGu<strong>in</strong>ness, 2001] Noy, N. F. and McGu<strong>in</strong>ness, D. L. (2001).<br />
<strong>Ontology</strong> development 101: A guide to creat<strong>in</strong>g your rst ontology.<br />
Development, 32(1):125. 5.1, 5.1.1<br />
[Oracle, 2012] Oracle (2012). Oracle vm virtualbox. https://www.<br />
virtualbox.org/. [last accessed:17.02.2013]. 8.1<br />
[Pérez et al., 2009] Pérez, J., Arenas, M., and Gutierrez, C. (2009). Semantics<br />
and complexity of sparql. ACM Trans. Database Syst., 34(3):16:1<br />
16:45. 5.1.5<br />
[Prud'hommeaux, 2012] Prud'hommeaux, E. (2012). Sparql vs. sql<br />
- <strong>in</strong>tro - cambridge semantics. http://www.cambridgesemantics.<br />
com/de/semantic-university/sparql-vs-sql-<strong>in</strong>tro. [last accessed:17.02.2013].<br />
5.1.5<br />
[Rutkowska, 2007] Rutkowska, J. (2007). Beyond the cpu: Defeat<strong>in</strong>g hardware<br />
based ram acquisition (part i: Amd case). In Black Hat 2007. 4.1.2.2<br />
[Salzburg Research, 2012] Salzburg Research, A. (2012). Rdf-gravity.<br />
http://semweb.salzburgresearch.at/apps/rdf-gravity/. [last accessed:17.02.2013].<br />
5.2.4<br />
[Schreck et al. Siemens CERT, ] Schreck et al. Siemens CERT. Categorization<br />
of digital <strong>for</strong>ensic data (random access memory). Not yet published.<br />
4.2.2, 4.2.2