The following is a partial bibliography of topics related to computer or cyber forensics.
Daubert v. Merrel Dow Pharmaceuticals, 509 US, 113 S.T. 2786, 125 L.Ed. 2d 469 C.F.R. (1993).
STC builds the largest data network in the region & adopts the fastest routing system in the history of telecom industry. (2006). IT & Telecom. Retrieved December 2, 2006, from http://www.menareport.com/en/business,IT_and_Telecom/205049
Adelstein, F. (2006). Live Forensics: Diagnosing your system without killing it first. Communications of the ACM, 49(2), 63-66.
Alvarez, S. A. P. (2004). Using extended file information (EXIF) file headers in digital evidence analysis. International Journal of Digital Evidence(Winter).
American Polygraph Association. American Polygraph Association response to the National Academy of Sciences. Retrieved May 2, 2006, 2006, from http://www.polygraph.org/nasresponse.htm
American Society of Crime Laboratory Directors. (2005). Laboratory Accreditation Board 2005 Manual o. Document Number)
Association of Chief Police Officers. (2003). Good practice guide for computer based electronic evidence: National High Tech Crime Unito. Document Number)
Axlerod, H., & Jay, D. R. (1999). Crime and Punishment in Cyberspace: Dealing with law enforcement and the courts. Paper presented at the 27th annual ACM SIGUCCS Conference on User Services: Mile High Expectations, Denver, Colorado, United States.
Bailey, M., Cooke, E., Jahanian, F., Provos, N., Rosaen, K., & Watson, D. (2005). Data reduction for the scalable automated analysis of distributed darknet traffic. Paper presented at the USENIX/ACM Internet Measurement Conference, New Orleans, LA.
Baryamureeba, V., & Tushabe, F. (2004, August 11th -13th 2004). The enhanced digital investigation process model. Paper presented at the Digital Forensic Research Workshop, Baltimore, MD.
Becker, J. (1982). Computer crime career of the future? Special Interest Group Computers and Society, 12(1), 12-15.
Becker, J. (1982). Who are the computer criminals? Special Interest Group Computers and Society, 12(1), 18-20.
Bendersky, D., Futoransky, A., Notarfrancesco, L., Sarraute, C., & Waissbein, A. (2003). Advanced software protection now. from http://www. coresecurity. com/corelabs/projects/software protection. php
Berghel, H. (2003). The discipline of Internet forensics. Communications of the ACM, 46(8), 15-20.
Bhaskar, R. (2006). State and local law enforcement is not ready for a cyber Katrina. Communications of the ACM, 49(2), 81-83.
Bishop, M. (1993). Teaching computer security. Paper presented at the IFIP TC11, Ninth International Conference on Information Security: Computer Security.
Blankenhorn, C. A., Huebner, E., & Cook, M. (2005). Forensic investigation of data in live high volume environments Retrieved October 2, 2006, 2006, from http://www.cit.uws.edu.au/compsci/computerforensics/Technical%2520Reports/Blankenhorn2005.doc
Bogen, A. C., & Dampier, D. A. (2004). Knowledge discovery and experience modeling in computer forensics media analysis. Paper presented at the 2004 International Symposium on Information and Communication Technologies, Las Vegas, Nevada.
Brodsky, S. L. (1999). The Expert Expert Witness: More maxims and guidelines for testifying in court (1st ed.). Washington, DC: American Psychological Association.
Buchholz, F. P. (2004). Providing process origin information to aid in computer forensic investigations. Journal of Computer Security, 12(5), 753-776.
Burton, A. M., Schofield, D., & Goodwin, L. M. (2005). Gates of Global Perception: Forensic graphics for evidence presentation. Paper presented at the 13th Annual ACM International Conference on Multimedia, Hilton, Singapore.
Carney, M., & Rogers, M. (2004). The Trojan Made Me Do It: A First Step in Statistical Based Computer Forensics Event Reconstruction. International Journal of Digital Evidence, 2(4).
Carrier, B. (2003). Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers. International Journal of Digital Evidence, 1(4).
Carrier, B., & Shields, C. (2004). The session token protocol for forensics and traceback. ACM Transactions on Information and System Security, 7(3), 333-362.
Carrier, B., & Spafford, E. H. (2003). Getting physical with the digital investigation process. International Journal of Digital Evidence, 2(2), 1-20.
Carrier, B. D. (2006). Risks of live digital forensic analysis. Communications of the ACM, 49(2), 56-61.
Carrier, B. D., & Grand, J. (2004). A Hardware-Based Memory Acquisition Procedure for Digital Investigations. Digital Investigation, 1(1).
Cartwright, D. (2003). Architectural Innovations for Enterprise Forensics. Paper presented at the 1st Australian Computer, Network & Information Forensics Conference Perth, Western Australia.
Casey, E. (2002). Error, Uncertainty, and Loss in Digital Evidence. International Journal of Digital Evidence, 1(3), 71-74.
Casey, E. (2002). Practical Approaches to Recovering Encrypted Digital Evidence. International Journal of Digital Evidence(Fall).
Casey, E. (2006). Investigating Sophisticated Security Breaches. Communications of the ACM, 49(2), 48-55.
Charles, K. (2004). Decoy Systems: A New Player in Network Security and Computer Incident Response. International Journal of Digital Evidence(Winter).
Ciardhuáin, S. (2004). An Extended Model of Cybercrime Investigations. International Journal of Digital Evidence, 3(1).
Clarke, R. (1988). Information Technology and Dataveillance. Communications of the ACM, 31(5), 498-512.
Coldwell, R. A. (1993). University Students’ Attitudes Towards Computer Crime: A Research Note. Special Interest Group Computers and Society, 23(1-2), 11-14.
Cooper, P. (2005). Speciation in the Computing Sciences: Digital Forensics as an Emerging Academic Discipline. Paper presented at the 2nd Annual Conference on Information Security Curriculum Development, Kennesaw, Georgia.
Corey, V., Peterman, C., Shearin, S., Greenberg, M. S., & Van Bokkelen, J. (2002). Network Forensics Analysis. Internet Computing, IEEE, 6(6), 60-66.
Crowley, E. (2003). Information System Security Curricula Development. Paper presented at the 4th Conference on Information Technology Curriculum, Lafayette, Indiana, USA.
Cumming, A. (2006). Polygraph Use by the Department of Energy: Issues for Congress. Retrieved May 2, 2006. from http://www.fas.org/sgp/crs/intel/RL31988.pdf.
Curran, K., Morrissey, C., Fagan, C., Murphy, C., O’Donnell, B., Fitzpatrick, G., et al. (2005). Monitoring Hacker Activity With a Honeynet. International Journal of Network Management, 15(2), 123-134.
Dai, J. S., Xiao, J. M., & Zhang, J. (2005). Research and Design of a Distributed Network Real Forensics System. Journal of University of Electronic Science and Technology of China, 34(3), 347-350.
Dario, F. (2002). Analyzing the Difficulties in Backtracking Onion Router Traffic. International Journal of Digital Evidence, 1(2).
Dear, D. L. (2005, June 13, 2005). An Exploration of Future Anti-Forensic Techniques. Retrieved October 2, 2006, 2006, from http://www.assuremind.com/antiForensics.pdf
Demidov, V. V. (2003). DNA Diagnostics in the Fifty-Year Retrospect. Future Drugs Ltd.((3)2), 121-124.
Denning, D. E. (1991). The United States vs. Craig Neidorf: A Debate on Electronic Publishing, Constitutional Rights and Hacking. Communications of the ACM, 34(3), 22-43.
Denning, D. E. (1993). To Tap or Not to Tap. Communications of the ACM, 36(3), 24-33.
Denning, P. J. (1984). Computers, Crime and Privacy a National Dilemma: Congressional Testimony From the Industry. Communications of the ACM, 27(4), 312-313.
Ellis, K. J., & Serinken, N. (2001). Characteristics of Radio Transmitter Fingerprints. Radio Science, 36(4), 585-598.
Fei, B. K. L., Eloff, J. H. P., Olivier, M. S., Tillwick, H. M., & Venter, H. S. (2005). Using Self-Organising Maps for Anomalous Behaviour Detection in a Computer Forensic Investigation. Pretoria, South Africa: Information and Computer Security Architectures (ICSA) Research Groupo. Document Number)
Fernandez, J. D., Stephen, S., Mario, G., & Dulal, K. (2005). Computer Forensics: A Critical Need in Computer Science Programs. The Journal of Computing in Small Colleges, 20(4), 315-322.
Francia, G. A., & Keion, C. (2005). Computer Forensics Laboratory and Tools. The Journal of Computing in Small Colleges, 20(6), 143-150.
Gal-Or, E., & Ghose, A. (Unpublished). The Economic Consequences of Sharing Security Information. Unpublished Book. Katz School, Univeristy of Pittsburgh.
Gao, Y., Richard Iii, G. G., & Roussev, V. (2004). Bluepipe: A Scalable Architecture for On-the-Spot Digital Forensics. International Journal of Digital Evidence, 3(1).
Garfinkel, S. L. (2006). AFF: A New Format for Storing Hard Drive Images. Communications of the ACM, 49(2), 85-87.
Garfinkel, T., & Rosenblum, M. (2003, 6-7 February 2003). A Virtual Machine Introspection Based Architecture for Intrusion Detection. Paper presented at the 2003 Network and Distributed System Security Symposium (NDSS), San Diego, California.
Giordano, J., & Maciag, C. (2002). Cyber Forensics: A Military Operations Perspective. International Journal of Digital Evidence, 1(2).
Gladney, H. M. (2004). Trustworthy 100-year Digital Objects: Evidence After Every Witness is Dead. ACM Transactions on Information Systems, 22(3), 406-436.
Gordon, L. A., Loeb, M. P., Lucyshyn , W., & Richardson, R. (2005). CSI/FBI Computer Crime and Security Survey: Computer Security Instituteo. Document Number)
Gordon, S., & Ford, R. (2006). On the Definition and Classification of Cybercrime. Journal in Computer Virology, 2(1), 13-20.
Gottschalk, L., Liu, J., Dathan, B., Fitzgerald, S., & Stein, M. (2005). Computer Forensics Programs in Higher Education: A Preliminary Study. Paper presented at the 36th SIGCSE Technical Symposium on Computer Science Education, St. Louis, Missouri, USA.
Grid Computing. (2006). Grid Computing. Retrieved December 2, 2006, from http://www.gridcomputing.com
Hall, J., Barbeau, M., & Kranakis, E. (2003). Detection of Transient in Radio Frequency Fingerprinting Using Signal Phase. Paper presented at the IASTED International Conference on Wireless and Optical Communications, Banf, Alberta.
Hall, J., Barbeau, M., & Kranakis, E. (2004). Enhancing Intrusion Detection in Wireless Networks Using Radio Frequency Fingerprinting (Extended Abstract). Paper presented at the Communications, Internet, and Information Technology, St. Thomas, US Virgin Islands.
Hall, J., Barbeau, M., & Kranakis, E. (2005). Using Mobility Profiles for Anomaly-Based Intrusion Detection in Mobile Networks. Paper presented at the Wireless and Mobile Computing, Networking and Communications, San Diego, Ca.
Hall, J., Barbeau, M., & Kranakis, E. (2005). Radio Frequency Fingerprinting for Intrusion Detection in Wireless Networks. IEEE Transactions on Dependable and Secure Computing.
Hannan, M., Turner, P., & Broucek, V. (2003). Refining the Taxonomy of Forensic Computing in the Era of E-crime: Insights from a Survey of Australian Forensic Computing Investigation (FCI) Teams. 4th Australian Information Warfare and IT Security Conference, Adelaide, SA, Australia.
Harrinson, W. (2002). A Lessons Learned Repository for Computer Forensics. International Journal of Digital Evidence(Fall).
Harrison, W., Heuston, G., Mocas, S., Morrissey, M., & Richardson, J. (2004). High-Tech Forensics. Communications of the ACM, 47(7), 48-52.
Heywood, J. (1997). An Evaluation of Kolb’s Learning Style Theory by Graduate Student Teachers during Their Teaching Practice. Retrieved March 6, 2006, 2006, from http://eric.ed.gov/ERICDocs/data/ericdocs2/content_storage_01/0000000b/80/25/d9/e7.pdf
Hollinger, R. C. (1991). Hackers: Computer Heroes or Electronic Highwaymen? Special Interest Group Computers and Society, 21(1), 6-17.
Hosmer, C. (2002). Proving the Integrity of Digital Evidence with Time. International Journal of Digital Evidence, 1.
Hosmer, C. (2006). Digital Evidence Bag. Communications of the ACM, 49(2), 69-70.
Householder, A., Houle, K., Dougherty, C., & Center, C. C. (2002). Computer Attack Trends Challenge Internet Security. Computer, 35(4).
Howerton, P. W. (1985). Computer crime (a tutorial). Paper presented at the 1985 ACM Annual Conference on The Range of Computing : Mid-80’s Perspective, Denver, Colorado, United States.
Jayasingh, B. B., & Patra, M. R. Distributed Agents Framework for Network Security a Case Study of an Attack.
Kelley, R. (2005, July 7, 2005). Man Charged With Wireless Trespassing. Retrieved October 30, 2006, from http://money.cnn.com/2005/07/07/technology/personaltech/wireless_arrest/
Keppens, J., & Zeleznikow, J. (2003). A Model Based Reasoning Approach for Generating Plausible Crime Scenarios From Evidence. Paper presented at the 9th international Conference on Artificial Intelligence and Law, Scotland, United Kingdom.
Kerr, O. S. (2005). Digital Evidence and the New Criminal Procedure. Columbia Law Review(The George Washington University Law School Public Law and Legal Theory Working Paper NO. 108).
Kerr, O. S. (2005). The Fourth Amendment and the Computer Forensics Process. The George Washington University Law School.
King, R., & Stanley, C. (1985). Ensuring Court Admissibility of Computer-Generated Records. ACM Transactions on Information Systems, 3(4), 398-412.
Kling, R. (1981). Computer Abuse and Computer Crime as Organizational Activities. Special Interest Group Computers and Society, 11(4), 12-24.
Laurie, B. (2004). Network Forensics. Queue, 2(4), 50-56.
Lee, H. C., Palmbach, T., & Miller, M. T. (2001). Henry Lee’s Crime Scene Handbook: Academic Press.
Liu, K. J. R., Trappe, W., Wang, Z. J., Wu, M., & Zhao, H. (2003). Forensics for Traitor Tracing. Nasr City Free Zone, Cairo, Egypt: Hindawi Publishing Corporation.
Maconachy, W. V., Schou, C. D., Ragsdale, D., & Welch, D. (2001). A Model for Information Assurance: An Integrated Approach. Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, US Military Academy, West Point, NY, 5-6.
Manzano, Y., & Yasinsac, A. (2000). Policies to Enhance Computer and Network Forensics. Paper presented at the IEEE Systems, Man, and Cybernetics Information Assurance Workshop, Nashville, TN.
McKemmish, R. (1999). What is Forensic Computing. Trends and Issues in Crime and Criminal Justice, 118(NO. 118).
McRoberts, F., Mills, S., Possley, M., & Marriott, J. (2004). Forensics Under the Microscope: A Chicago Tribune Investigative Series. Forensic Evidence in Criminal Trials Retrieved March 22, 2006, 2006, from www.deathpenaltyinfo.org/article.php?scid=17&did=1209
Mercuri, R. (2005). Challenges in Forensic Computing. Communications of the ACM, 48(12), 17-21.
Mergel, I., Lazer, D., & Binz-Scharf, M. C. (2005). Electronic Communication in a Geographically Dispersed Community of Forensic Scientists. Paper presented at the 2005 National Conference on Digital Government Research, Atlanta, Georgia.
Meyers, M., & Rogers, M. (2004). Computer Forensics: The Need for Standardization and Certification. International Journal of Digital Evidence, 3(2), 2002.
Microsoft. (2006). Windows Server 2003 Clustering Service. Retrieved December 2, 2006, from http://www.microsoft.com/windowsserver2003/technologies/clustering/default.mspx
Mueller L.D. (2002). Forensic DNA Laboratory Error Rates. Retrieved March 22, 2006, 2006, from http://darwin.bio.uci.edu/~mueller/error%20rates.html
Mukkamala, S., & Sung, A. H. (2003). Identifying Significant Features for Network Forensic Analysis Using Artificial Intelligent Techniques. International Journal of Digital Evidence, 1(4), 1–17.
National Institute of Justice. (2001). Electronic Crime Scene Investigation – NIJ Guide. Retrieved. from www.ojp.usdog.gov/nij.
Ning, P., & Xu, D. (2003). Learning Attack Strategies From Intrusion Alerts. Paper presented at the 10th ACM Conference on Computer and Communications Security, Washington D.C., USA.
Oates-Lewandowski, J. (2005). Creating a Culture of Technical Caution: Addressing the Issues of Security, Privacy Protection and the Ethical use of Technology. Paper presented at the 33rd annual ACM SIGUCCS Conference on User Services, Monterey, CA, USA.
Palmer, G. (2001). A Road Map for Digital Forensic Research (No. DTR – T001-01 FINAL). Utica, NY: Air Force Research Laboratory, Rome Research Site, Information Directorate/Defensive Information Warfare Branch,o. Document Number)
Parker, D. B. (1983). Testimony. Special Interest Group Software Engineering Notes, 8(5), 10-17.
Parker, D. B., & Nycum, S. H. (1984). Computer Crime and Privacy – A National Dilemma. Communications of the ACM, 27(4), 312-321.
Patel, A., & Ciardhuain, S. O. (2000). The Impact of Forensic Computing on Telecommunications. Communications Magazine, IEEE, 38(11), 64-67.
Patzakis, J. (2003). New Accounting Reform Laws Push For Technology-Based Document Retention Practices. International Journal of Digital Evidence, 2(1).
Peron, C., & Legary, M. (2002). Digital Anti-Forensics: Emerging Trends in Data Transformation Techniques. Seccuris Labs Retrieved October 2, 2006, from http://seccuris.com/documents/papers/Seccuris-Antiforensics.pdf
Reith, M., Carr, C., & Gunsch, G. (2002). An Examination of Digital Forensic Models. International Journal of Digital Evidence, Fall.
Ren, W., & Jin, H. (2005). Distributed Agent-Based Real Time Network Intrusion Forensics System Architecture Design. Paper presented at the 19th International Conference on Advanced Information Networking and Applications.
Ren, W., & Jin, H. (2005). Honeynet Based Distributed Adaptive Network Forensics and Active Real Time Investigation. Paper presented at the 2005 ACM Symposium on Applied computing.
Richard III, G., G,., & Roussev, V. (2005). Scalpel: A Frugal, High Performance File Carver. Paper presented at the Digital Forensics Research Workshop, New Orleans, LA.
Richard III, G., G,., & Roussev, V. (2006). Next-Generation Digital Forensics. Communications of the ACM, 49(2), 76-80.
Rogers, M. (2005). DCSA: A Practical Aproach to Digital Crime Scene Analysis. Unpublished Pre-Publication. Purdue University
Roussev, V., & Richard III, G., G,. (2004). Breaking the Performance Wall: The Case for Distributed Digital Forensics. Paper presented at the Digital Forensics Research Workshop, Baltimore, Md.
Rowlingson, R. (2004). A Ten Step Process for Forensic Readiness. International Journal of Digital Evidence, 2(3).
Rynson, W. H. L., Kwok-Yan, L., & Siu-Leung, C. (1996). The Failure of Anti-Hacking Legislation: A Hong Kong Perspective. Paper presented at the 3rd ACM Conference on Computer and Communications Security, New Delhi, India.
Sacerdoti, F. D., Katz, M. J., Massie, M. L., & Culler, D. E. (2003). Wide Area Cluster Monitoring With Ganglia. Paper presented at the IEEE International Conference on Cluster Computing, Hong Kong.
Saks, M. J., & Koehler, J. J. (2005). The Coming Paradigm Shift in Forensic Identification Science. Science, 309, 892-895.
Schneier, B., & Kelsey, J. (1999). Secure audit logs to support computer forensics. ACM Transactions on Information and System Security, 2(2), 159-176.
Schwarz, T. S. J. (2005). Teaching Ethics and Computer Forensics: The Markkula Center for Applied Ethics Approach. Paper presented at the 2nd Annual Conference on Information Security Curriculum Development, Kennesaw, Georgia.
Sekaran, U. (2003). Research Methods For Business A skill Building Approach (Fourth ed.). New York: John Wiley & Sons.
Shanmugasundaram, K., Memon, N., Savant, A., & Bronnimann, H. (2003). ForNet: A Distributed Forensics Network. The Second International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, St. Petersburg, Russia, October.
Shpantzer, G., & Ipsen, T. (2002). Law Enforcement Challenges in Digital Forensics. Paper presented at the 6th Nationall Colloquium Information Systems Security Education, Redmond, WA.
Sieka, B. (2006). Active fingerprinting of 802.11 Devices by Timing Analysis. Paper presented at the Consumer Communications and Networking Conference 3rd IEEE.
Simple Nomad. (2003). Covering Your Tracks: Ncrypt and Ncovert. Black Hat Briefings Retrieved October 2, 2006
Snyder, R. M. (2005). An After-the-Fact Computer Forensics Investigation With Ethical Consequences: Experience and Recommendations. Paper presented at the 2nd Annual Conference on Information Security Curriculum Development, Kennesaw, Georgia.
Soe, L. L., Manson, D., & Wright, M. (2004). Establishing Network Computer Forensics Classes. Paper presented at the 1st Annual Conference on Information Security Curriculum Development, Kennesaw, Georgia.
Sommer, P. (2002). Digital Evidence: Emerging Problems in Forensic Computing. International Journal of Digital Evidence, 2002-2005.
Stephenson, P. (2003). Modeling of Post-Incident Root Cause Analysis. International Journal of Digital Evidence, 2(2).
Stolfo, S. J., & Hershkop, S. (2005). Email Mining Toolkit Supporting Law Enforcement Forensic Analyses. Paper presented at the 2005 National Conference on Digital Government Research, Atlanta, Georgia.
Sukhai, N. B. (2004). Hacking and Cybercrime. Paper presented at the 1st Annual Conference on Information Security Curriculum Development, Kennesaw, Georgia.
Szalay, A. S. (2002). Petabyte Scale Data Mining: Dream or Reality? Paper presented at the SIPE Astronmy Telescopes and Instruments, Waikoloa, Hawaii.
Tang, Y., & Daniels, T., E. . (2005). A Simple Framework for Distributed Forensics. Paper presented at the Second International Workshop on Security in Distributed Computing Systems (SDCS) (ICDCSW’05).
Teelink, S., & Erbacher, R. F. (2006). Improving the Computer Forensic Analysis Process Through Visualization. Communications of the ACM, 49(2), 71-75.
Tekbas, O. H., Ureten, O., & Serinken, N. (2004). Improvement of Transmitter Identification System for Low SNR Transients. Electronics Letters, 40(3), 182-183.
Telpner, Z., & Mostek, M. S. (2003). Expert Witnessing in Forensic Accounting : A Handbook for Lawyers and Accountants. Boca Raton, Fla.: CRC Press.
The Associated Press. (2005). Florida Man Charged With Stealing Wi-Fi Signal. Online. Retrieved October 30, 2006, from http://www.usatoday.com/tech/news/techpolicy/2005-07-07-wifitheft_x.htm?csp=34
The Common Digital Evidence Storage Format Working Group. (2006). Standardizing Digital Evidence Storage. Communications of the ACM, 49(2), 67-68.
The Grug. (2003). The Art of Defiling: Defeating Forensic Analysis. Black Hat Briefings Retrieved October 2, 2006, from http://www.blackhat.com/html/bh-asia-03/bh-asia-03-speakers.html#grugq
Troell, L., Pan, Y., & Stackpole, B. (2003). Forensic Course Development. Paper presented at the 4th Conference on Information Technology Curriculum, Lafayette, Indiana, USA.
Troell, L., Pan, Y., & Stackpole, B. (2004). Forensic Course Development: One Year Later. Paper presented at the 5th Conference on Information Technology Education, Salt Lake City, UT, USA.
Tuerkheimer, F. M. (1993). The Underpinnings of Privacy Protection. Communications of the ACM, 36(8), 69-73.
United States. Supreme Court., & United States. Congress. House. Committee on the Judiciary. (2003). Amendments to Federal Rules of Evidence Communication From the Chief Justice, the Supreme Court of the United States, Transmitting Amendments to the Federal Rules of Evidence That Have Been Adopted by the Court, Pursuant to 28 U.S.C. 2072. Retrieved. from http://purl.access.gpo.gov/GPO/LPS30652
Vel, O. d., Anderson, A., Corney, M., & Mohay, G. (2001). Mining E-mail Content for Author Identification Forensics. SIGMOD Rec., 30(4), 55-64.
Vreede, G.-J. d., Hengst, S. O. d., & Sol, H. G. (1995). Facilitating User Involvement in Information System Design and Development with GSS: The Organized Crime Case. Paper presented at the 1995 ACM SIGCPR Conference on Supporting Teams, Groups, and Learning Inside and Outside the IS Function Reinventing IS, Nashville, Tennessee, United States.
Wang, W., & Daniels, T. E. (2005). Building Evidence Graphs for Network Forensics Analysis. Computer Security Applications Conference, 21st Annual, 254-266.
Ware, W. H. (1984). Information Systems Security and Privacy. Communications of the ACM, 27(4), 315-321.
Wei, R. (2004). A Framework of Distributed Agent-based Network Forensics System: Digital Forensic Research Work Shop.
Weil, M. (2002). Dynamic Time & Date Stamp Analysis. International Journal of Digital Evidence.
Whitcomb, C. M. (2002). An Historical Perspective of Digital Evidence: A Forensic Scientist’s View. International Journal of Digital Evidence, 1(1).
Wolff, D. (1995). Performance Appraisal Research Applied to Forensics.
Xu, J. J., & Chen, H. (2005). CrimeNet Explorer: A Framework for Criminal Network Knowledge Discovery. ACM Transactions on Information Systems, 23(2), 201-226.
Zhang, Y., & Lee, W. (2000). Intrusion Detection in Wireless Ad-Hoc Networks. Paper presented at the 6th Annual International Conference on Mobile Computing and Networking.
Zhang, Y., Lee, W., & Huang, Y. A. (2003). Intrusion Detection Techniques for Mobile Wireless Networks. Wireless Networks, 9(5), 545-556.
Zhang, Z., Salerno, J. J., & Yu, P. S. (2003). Applying Data Mining in Investigating Money Laundering Crimes. Paper presented at the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, D.C.
Zhao, H. V., Wu, M., Wang, Z. J., & Liu, K. J. R. (2005). Forensic Analysis of Nonlinear Collusion Attacks for Multimedia Fingerprinting. IEEE Transactions on Image Processing 14(5).
2 comments for “Cyber Forensics: A partial bibliography”