An Ontology for Digital Forensics in IT Security Incidents - OPUS
An Ontology for Digital Forensics in IT Security Incidents - OPUS
An Ontology for Digital Forensics in IT Security Incidents - OPUS
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
BIBLIOGRAPHY 89<br />
[Schuster, 2006] Schuster, A. (2006). Search<strong>in</strong>g <strong>for</strong> processes and threads <strong>in</strong><br />
microsoft w<strong>in</strong>dows memory dumps. Digit. Investig., 3:1016. 4.3.2<br />
[Sent<strong>in</strong>el Chicken Networks, 2010] Sent<strong>in</strong>el Chicken Networks (2010). RegLookup.<br />
http://projects.sent<strong>in</strong>elchicken.org/reglookup/. [last<br />
accessed:17.02.2013]. 4.3.3<br />
[Stan<strong>for</strong>d Center <strong>for</strong> Biomedical In<strong>for</strong>matics Research, 2013] Stan<strong>for</strong>d Center<br />
<strong>for</strong> Biomedical In<strong>for</strong>matics Research (2013). The protégé ontology editor<br />
and knowledge acquisition system. http://protege.stan<strong>for</strong>d.edu/.<br />
[last accessed:17.02.2013]. 5.2.2<br />
[Tang and Daniels, 2005] Tang, Y. and Daniels, T. (2005). A simple<br />
framework <strong>for</strong> distributed <strong>for</strong>ensics. In Distributed Comput<strong>in</strong>g Systems<br />
Workshops, 2005. 25th IEEE International Conference on, pages 163 <br />
169. 1<br />
[The Associated Press, 2012] The Associated Press (2012). Computer disk<br />
may have cracked btk case - us news - crime & courts | nbc news. http:<br />
//www.nbcnews.com/id/6988048/. [last accessed: 17.02.2013]. 4.1.1<br />
[The GNOME Project, 2011] The GNOME Project (2011). dconf - gnome<br />
live! https://live.gnome.org/dconf. [last accessed:17.02.2013]. 4.2.3.1<br />
[Tissieres and Oechsl<strong>in</strong>, 2013] Tissieres, C. and Oechsl<strong>in</strong>, P. (2013).<br />
ophcrack - browse /samdump2 at source<strong>for</strong>ge.net. http://source<strong>for</strong>ge.<br />
net/projects/ophcrack/files/samdump2. [last accessed: 17.02.2013].<br />
4.3.4<br />
[Van Baar et al., 2008] Van Baar, R. B., Al<strong>in</strong>k, W., and Van Ballegooij,<br />
A. R. (2008). Forensic memory analysis: Files mapped <strong>in</strong> memory. Digit.<br />
Investig., 5:S52S57. 4.3.2<br />
[Vidas, 2007] Vidas, T. (2007). The acquisition and analysis of random access<br />
memory. Journal of <strong>Digital</strong> Forensic Practice, 1(4):315323. 4.1.2,<br />
4.1.2.2<br />
[Volatile Systems, 2012a] Volatile Systems (2012a). Commandreference21 -<br />
volatility - example usage cases and output <strong>for</strong> volatility 2.1 commands -<br />
an advanced memory <strong>for</strong>ensics framework - google project host<strong>in</strong>g. http:<br />
//code.google.com/p/volatility/wiki/CommandReference21. [last accessed:17.02.2013].<br />
4.3.2<br />
[Volatile Systems, 2012b] Volatile Systems (2012b). The volatility<br />
framework: Volatile memory artifact extraction utility framework.<br />
https://www.volatilesystems.com/default/volatility. [last accessed:17.02.2013].<br />
4.3.2