15.01.2014 Views

An Ontology for Digital Forensics in IT Security Incidents - OPUS

An Ontology for Digital Forensics in IT Security Incidents - OPUS

An Ontology for Digital Forensics in IT Security Incidents - OPUS

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

BIBLIOGRAPHY 89<br />

[Schuster, 2006] Schuster, A. (2006). Search<strong>in</strong>g <strong>for</strong> processes and threads <strong>in</strong><br />

microsoft w<strong>in</strong>dows memory dumps. Digit. Investig., 3:1016. 4.3.2<br />

[Sent<strong>in</strong>el Chicken Networks, 2010] Sent<strong>in</strong>el Chicken Networks (2010). RegLookup.<br />

http://projects.sent<strong>in</strong>elchicken.org/reglookup/. [last<br />

accessed:17.02.2013]. 4.3.3<br />

[Stan<strong>for</strong>d Center <strong>for</strong> Biomedical In<strong>for</strong>matics Research, 2013] Stan<strong>for</strong>d Center<br />

<strong>for</strong> Biomedical In<strong>for</strong>matics Research (2013). The protégé ontology editor<br />

and knowledge acquisition system. http://protege.stan<strong>for</strong>d.edu/.<br />

[last accessed:17.02.2013]. 5.2.2<br />

[Tang and Daniels, 2005] Tang, Y. and Daniels, T. (2005). A simple<br />

framework <strong>for</strong> distributed <strong>for</strong>ensics. In Distributed Comput<strong>in</strong>g Systems<br />

Workshops, 2005. 25th IEEE International Conference on, pages 163 <br />

169. 1<br />

[The Associated Press, 2012] The Associated Press (2012). Computer disk<br />

may have cracked btk case - us news - crime & courts | nbc news. http:<br />

//www.nbcnews.com/id/6988048/. [last accessed: 17.02.2013]. 4.1.1<br />

[The GNOME Project, 2011] The GNOME Project (2011). dconf - gnome<br />

live! https://live.gnome.org/dconf. [last accessed:17.02.2013]. 4.2.3.1<br />

[Tissieres and Oechsl<strong>in</strong>, 2013] Tissieres, C. and Oechsl<strong>in</strong>, P. (2013).<br />

ophcrack - browse /samdump2 at source<strong>for</strong>ge.net. http://source<strong>for</strong>ge.<br />

net/projects/ophcrack/files/samdump2. [last accessed: 17.02.2013].<br />

4.3.4<br />

[Van Baar et al., 2008] Van Baar, R. B., Al<strong>in</strong>k, W., and Van Ballegooij,<br />

A. R. (2008). Forensic memory analysis: Files mapped <strong>in</strong> memory. Digit.<br />

Investig., 5:S52S57. 4.3.2<br />

[Vidas, 2007] Vidas, T. (2007). The acquisition and analysis of random access<br />

memory. Journal of <strong>Digital</strong> Forensic Practice, 1(4):315323. 4.1.2,<br />

4.1.2.2<br />

[Volatile Systems, 2012a] Volatile Systems (2012a). Commandreference21 -<br />

volatility - example usage cases and output <strong>for</strong> volatility 2.1 commands -<br />

an advanced memory <strong>for</strong>ensics framework - google project host<strong>in</strong>g. http:<br />

//code.google.com/p/volatility/wiki/CommandReference21. [last accessed:17.02.2013].<br />

4.3.2<br />

[Volatile Systems, 2012b] Volatile Systems (2012b). The volatility<br />

framework: Volatile memory artifact extraction utility framework.<br />

https://www.volatilesystems.com/default/volatility. [last accessed:17.02.2013].<br />

4.3.2

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!