Bridging the Gap between Software Development and Information Security
IEEE Security and Privacy
Verifiable audit trails for a versioning file system
Proceedings of the 2005 ACM workshop on Storage security and survivability
Live forensics: diagnosing your system without killing it first
Communications of the ACM - Next-generation cyber forensics
A computer forensics minor curriculum proposal
Journal of Computing Sciences in Colleges
A methodology for the repeatable forensic analysis of encrypted drives
Proceedings of the 1st European Workshop on System Security
Recovering data from USB flash memory sticks that have been damaged or electronically erased
Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
Acquiring volatile operating system data tools and techniques
ACM SIGOPS Operating Systems Review
Computer forensics in forensis
ACM SIGOPS Operating Systems Review
Decentralized access control in distributed file systems
ACM Computing Surveys (CSUR)
Insecure context switching: inoculating regular expressions for survivability
WOOT'08 Proceedings of the 2nd conference on USENIX Workshop on offensive technologies
MM '09 Proceedings of the 17th ACM international conference on Multimedia
TimeCapsule: secure recording of accesses to a protected datastore
Proceedings of the 1st ACM workshop on Virtual machine security
Synthesising monitors from high-level policies for the safe execution of untrusted software
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
Trail of bytes: efficient support for forensic analysis
Proceedings of the 17th ACM conference on Computer and communications security
Extending digital repository architectures to support disk image preservation and access
Proceedings of the 11th annual international ACM/IEEE joint conference on Digital libraries
The impact of Microsoft Windows pool allocation strategies on memory forensics
Digital Investigation: The International Journal of Digital Forensics & Incident Response
A survey of main memory acquisition and analysis techniques for the windows operating system
Digital Investigation: The International Journal of Digital Forensics & Incident Response
An efficient technique for enhancing forensic capabilities of Ext2 file system
Digital Investigation: The International Journal of Digital Forensics & Incident Response
BodySnatcher: Towards reliable volatile memory acquisition by software
Digital Investigation: The International Journal of Digital Forensics & Incident Response
The forensic use of mobile phone flasher boxes
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Persistent systems techniques in forensic acquisition of memory
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Case study: Network intrusion investigation - Preparation and challenges
Digital Investigation: The International Journal of Digital Forensics & Incident Response
User data persistence in physical memory
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Toward a general collection methodology for Android devices
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Detecting data theft using stochastic forensics
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Data hiding in the NTFS file system
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Searching for processes and threads in Microsoft Windows memory dumps
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Using open source for forensic purposes
Proceedings of the Workshop on Open Source and Design of Communication
Game-based forensics course for first year students
Proceedings of the 13th annual conference on Information technology education
File and memory security analysis for grid systems
HPCC'07 Proceedings of the Third international conference on High Performance Computing and Communications
Hi-index | 0.00 |