References
- Martini B, Choo K-KR. Distributed filesystem forensics: XtreemFS as a case study. Digit Invest. 2014;11(4):295–313. 10.1016/j.diin.2014.08.002
- Do Q, Martini B, Choo K-KR. A forensically sound adversary model for mobile devices. PLOS ONE. 2015;10(9):e0138449. doi:10.1371/journal.pone.0138449.
- Dezfouli FN, Dehghantanha A, Eterovic-Soric B, Choo K-KR. Investigating social networking applications on smartphones detecting Facebook, Twitter, Linkedin and Google+ artefacts on android and iOS platforms. Aus J Forensic Sci. 2016;48(4):469–488. doi:10.1080/00450618.2015.1066854.
- Martini B, Do Q and Choo K-K R. Chapter 14 – Conceptual evidence collection and analysis methodology for Android devices. In Ko R and Choo K-K R, editors, Cloud security ecosystem. Waltham, MA: Syngress. 2015;285–307, an Imprint of Elsevier. http://dx.doi.org/10.1016/B978-0-12-801595-7.00014-8
- Quick D, Martini B, Choo K-KR. Cloud storage forensics. Fukuoka: Syngress Publishing / Elsevier; 2013.
- Nance K., Bishop M, Hay B. Investigating the implications of virtual machine introspection for digital forensics. Availability, Reliability and Security, 2009. ARES ‘09. International Conference on, vol., no., pp. 1024–1029; 2009 March 16-19.
- OS Platform Statistics. [Online], [cited 2012 May 5]. Available from: http://www.w3schools.com/browsers/browsers_os.asp
- Registry Quick Find Chart, AccessData Corp. 2006, [Online], [cited 2013 Apr 5]. Available from: http://www.accessdata.com/support/white%5Fpap
- Mee V, Tryfonas T, Sutherland I. The windows registry as a forensic artefact: illustrating evidence collection for internet usage. Digit Invest. 2006;3(3):166–173. 10.1016/j.diin.2006.07.001
- Farmer DJ. A forensic analysis of the windows registry 2007, [Online], [cited 2013 Dec 30]. Available from: http://web.nmsu.edu/~agarcia9/portfolio/A_Forensic_Examination_of_the_Windows_Registry_DETAILED.pdf
- Carvey H. The windows registry as a forensic resource. Digit Invest. 2005a;2(3):201–205. 10.1016/j.diin.2005.07.003
- Carvey H. Windows forensic analysis. Norwell, MA, US: Syngress, ISBN 159749156X; 2007.
- Wong LW. “Forensic analysis of the windows registry” forensic focus 2007, [Online], [cited 2012 Mar 5]. Available from: http://www.forensicfocus.com/index.php?name=Content&pid=73&page=1
- Dolan-Gavitt B. Forensic analysis of the windows registry in memory. Digit Invest. 2008;5:S26–S32. 10.1016/j.diin.2008.05.003
- Russinovich M. Inside the registry. [Online], [cited 2012 Aug 5]. Available from: http://technet.microsoft.com/en-us/library/cc750583.aspx
- Anand G. Internal structures of the windows registry 2008. [Online], [cited 2013 Jul 7]. Available from: http://blogs.technet.com/ganand/archive/2008/01/05/internalstructures-of-the-Windows-registry.aspx
- Bem D, Huebner E. Computer Forensic Analysis in a virtual environment. Int J Digit Evidence. Fall 2007;6(2):1–13.
- Irfan M, Abbas H, Sun Y, Sajid A, Pasha M. A framework for cloud forensics evidence collection and analysis using security information and event management. Secur Commun Netw. 2016. doi:10.1002/sec.1538.
- Abbas H, Yasin M, Ahmed F, Sajid A, Khan F. Forensics evidence collection and analysis mechanism for social media clients. In Press.
- Mrdovic S, Huseinovic A, Zajko E. Combining static and live digital forensic analysis in virtual environment. Information, Communication and Automation Technologies, 2009. ICAT 2009. XXII International Symposium on. vol., no., pp; 1–6, 2009 Oct 29-31.
- Quick D, Choo K-KR. Google drive: forensic analysis of data remnants. J Netw Comput Appl. April 2014;40:179–193.
- Canlar ES, Conti M, Crispo B, Di Pietro R. Windows mobile liveSD forensics. J Netw Comput Appl. March 2013;36(684):677–684, ISSN 1084-8045. 10.1016/j.jnca.2012.12.024
- Bossardt M, Dübendorfer T, Plattner B, Enhanced internet security by a distributed traffic control service based on traffic ownership, J Netw Comput Appl. August 2007; 30(3):841–857, ISSN 1084-8045. 10.1016/j.jnca.2005.07.006
- Martini B, Choo K-KR. Remote programmatic vcloud forensics: a six-step collection process and a proof of concept. Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on Year; 2014, 935–942, DOI: 10.1109/TrustCom.2014.124
- Wong LW, Forensic analysis of the windows registry, forensic focus 2007, [Online], [cited 2013 May 12]. Available from: http://www.forensicfocus.com/index.php?name=Content&pid=73&page=1
- Leom MD, D’Orazio C, Deegan G and Choo KKR. Forensic collection and analysis of thumbnails in android. In Proceedings of 14th IEEE international conference on trust, security and privacy in computing and communications (TrustCom 2015), pp. 1059–1066; 20–22 August 2015, IEEE Computer Society Press. http://dx.doi.org/10.1109/Trustcom-BigDataSe-ISPA.2015.483
- Quick D, Tassone C and Choo K-KR. Forensic analysis of windows thumbcache files. In Proceedings of 20th Americas Conference on Information Systems (AMCIS 2014); 7–10 August 2014, Association for Information Systems. Available from: http://aisel.aisnet.org/amcis2014/ISSecurity/GeneralPresentations/13
- Security in a Virtual World, A Security Viewpoint – Sept 2008, [Online], [cited 2013 Sep 17]. Available from: http://technet.microsoft.com/en-us/library/cc974514.aspx
- Description of the Microsoft Windows Registry, Help and Support, Microsoft Corp 2007, [Online], [cited 2013 Jun 5]. Article ID: 256986. Available from: http://support.microsoft.com/kb/256986/
- Registry Viewer 1.7.4 [Online], [cited 2014 Feb 15]. Available from: http://www.accessdata.com/support/product-downloads
- Hex Workshop, [Online], [cited 2014 Feb 15]. Available from: http://www.hexworkshop.com/