Bibliographical Database
Digital Forensics Bibliography
- Adelstein, Frank. "Live Forensics: Diagnosing your system without killing it first." Communications of the ACM 49. 2. (February 2006): 63-66.
- Association of Chief Police Officers.. Good Practice Guide for Computer-Based Electronic Evidence. 7Safe Information Security, n.d..
http://www.7safe.com/electronic_evidence/ACPO_guidelines_computer_evidence.pdf
- Beebe, Nicole Lang, Sonia D. Stacy, and Dane Stuckey. "Digital forensic implications of ZFS." Digital Investigation 6. Supplement. (2009): S99-S107.
- Boyd, Chris and Pete Forster. "Time and date issues in forensic computing - a case study." Digital Investigation 1 (2004): 18-23.
- Brinson, Ashley, Abigail Robinson, and Marcus Rogers. "A cyber forensics ontology: Creating a new approach to studying cyber forensics." Digital Investigation 3. Supplement 1. (2006): S37-S43.
- Buchholz, Florian and Brett Tjaden. "A brief study of time." Digital Investigation 4S (2007): S31-S42.
- Buchholz, Florian and Eugene Spafford. "On the role of file system metadata in digital forensics." Digital Investigation 1 (2004).
- Buskirk, Eric Van and Vincent T. Liu. "Digital Evidence: Challenging the Presumption of Reliability." Journal of Digital Forensic Practice 1 (2006): 19-26.
- Carrier, Brian. Open Source Digital Forensics Tools: The Legal Argument.
www.digital-evidence.org/papers/opensrc_legal.pdf
- Carrier, Brian D.. "Risks of Live digital Forensic Analysis." Communications of the ACM 49 (February 2006): 56-61.
- Carrier, Brian D., Eugene H. Spafford. "Categories of digital investigation analysis techniques based on the computer history model." Digital Investigation 3. Supplemental. (2006): S121-S130.
- Case, Andrew, Cristina Andrew, Lodovico Marziale, Golden G. Richard, and Vassil Roussev. "FACE: Automated digital evidence discovery and correlation." Digital Investigation 5 (2008): S65-S75.
- Casey, Eoghan. "Attacks against forensic analysis." Digital Investigations 4 (2007): 104-106.
- Casey, Eoghan. "Digital forensics: Coming of age." Digital Investigation 6 (2009): 1-2.
- Caudill, David S. "Arsenic and Old Chemistry: Images of Mad Alchemists, Experts Attacking Experts, the Crisis in Forensic Science." Boston University Journal of Science & Technology Law 15 (2009): 1-33.
- Committee on Identifying the Needs of the Forensic Sciences Community, National
Research Council. Strengthening Forensic Science in the United States: A Path Forward. Washington DC: National Academies Press, 2009.
- Common Digital Evidence Storage Format Working Group, The. "Standardizing: DIGITAL EVIDENCE STORAGE." Communications of the ACM 49. 2. (February 2006): 67-68.
- Daniel, Scanlan M.. "Digital Forensics." In Digital Evidence in Criminal Law, Aurora, ON: Canadian Law Book, 2011.
- Department of Justice (US). 2007. Digital Forensic Analysis Methodology.
http://www.justice.gov/criminal/cybercrime/forensics_chart.pdf
- Digital Discovery Corporation. "Digital Discovery". Digital Forensics: The preservation, extraction, identification, analysis and documentation of digital evidence (2010). http://www.digitaldiscoverycorp.com/forensics/methodology.htm, accessed (2011/01/01).
- Golden, Richard G. and Vassil Roussev. "Next-Generation Digital Forensics." Communications of the ACM 49. 2. (February 2006): 76-80.
- Grimm, Paul W., Michael V. Ziccardi, and Alexander W. Major. "Back to the Future: Lorraine v. Markel American Insurance Co. and New Findings on the Admissibility of Electronically Stored Information." Akron Law Review 42 (2009): 357-418.
- Groberman, Harvey M. and Underwood, Graham J. Electronic evidence : materials prepared for the Continuing Legal Education seminar, Electronic evidence 2007. Vancouver, BC: Continuing Legal Education of B.C., 2007.
- Hadjidj, Rachid, Mourad Debbabi, Hakim Lounis, Farkhund Iqbal, Adam Szorer, Djamel Benredjem. "Towards an integrated e-mail forensic analysis framework." Digital Investigation 5 (2009): 124-137.
- Hosmer, Chet. "Digital Evidence Bag." Communications of the ACM 49. 2. (February 2006): 69-70.
- Howell, Beryl A. "Digital Forensics: Sleuthing on Hard Drives and Networks." Vermont Law Journal 31 (Fall 2005): 39-45.
- Hume, Gavin, QC, Robert Brun, QC, Bruce LeRose, QC, Glen Ridgway, QC, Kenneth Walker. Report of the Mirror Imaging Working Group: Forensic Copying of Computer Records by the Law Society. Vancouver, BC: Law Society of British Columbia, 14 October 2009.
http://www.lawsociety.bc.ca/publications_forms/report-committees/intro.html
- International Organization of Computer Evidence (IOCE). (2002). Guidelines for Best Practice in the Forensic Examination of Digital Technology.
http://www.ioce.org/fileadmin/user_upload/2002/ioce_bp_exam_digit_tech.html
- INTERPOL. Forensic Report on FARC Computers and Hardware Seized by Colombia. Lyon, France: ICPO-INTERPOL, 2008.
- Irons, A.D., P. Stephens, R.I. Ferguson. "Digital Investigation as a distinct discipline: A pedagogic
perspective." Digital Investigation 6 (2009): 82-90.
- Irons, Alastair. "Computer forensics and records management – compatible disciplines." Records Management Journal 16. 2. (2006): 102-112.
http://www.emeraldinsight.com/Insight/viewPDF.jsp?contentType=Article&Filename=html/Output/Published/EmeraldFullTextArticle/Pdf/2810160205.pdf
- Jon Shende. "The Impact of the Cloud on Digital Forensics - Part 1: Taking digital forensics beyond the traditional security perimeter into a cloud security perimeter.." Sys-Con Media (Nov. 29, 2010).
http://www.sys-con.com/node/1624576
- Jon Shende. "The Impact of the Cloud on Digital Forensics - Part 2: Looking at potential tools that can contribute to the cloud security perimeter." Sys-Con Media (Dec. 2, 2010).
http://jonshende.ulitzer.com/node/1624595
- Jones, Keith J., R. Bejtlic, & C.W. Rose. Real digital forensics : computer security and incident response. Upper Saddle River, NJ: Addison-Wesley, 2005.
- Kahvedzic,Damir, Tahar Kechadi, Digital Forensic Research workshop. "DIALOG: A framework for modeling, analysis and reuse of digital forensic knowledge." Digital Investigation 6 (2009): S23-S33.
- Kenneally, Erin. "Gatekeeping Out Of The Box: Open Source Software As A Mechanism To Assess Reliability For Digital Evidence." Virginia Journal of Law and Technology 13 (Fall 2001).
www.vjolt.net/vol6/issue3/v6i3-a13-Kenneally.html
- Kent, James and Chris Dale. "7Safe". ediscovery and forensics (February 2010). http://7safe.com/resources.html, accessed (2010/03/03).
- Kim, Kibom, Sangseo Park, Taejoo Chang, Cheolwon Lee, and Sungjai Baek. "Lessons learned from the construction of a Korean software
reference data set for digital forensics." Digital Investigation 6. Supplement. (2009): S108-S113.
- Leigland, Ryan and Axel W. Krings. "A Formalization of Digital Forensics." International Journal of Digital Evidence 3 (Fall 2004).
- Levine, Brian Neil, and Marc Liberatore. "DEX: Digital evidence provenance supporting reproducibility
and comparison." Digital Investigation 6. Supplement. (2009): S48-S56.
- Luciana Duranti. "From Digital Diplomatics to Digital Records Forensics." Archivaria 68 (2009).
- Luciana Duranti and Barbara Endicott-Popovsky. "Digital Records Forensics: A New Science and Academic Program for Forensic Readiness." Journal of Digital Forensics, Security and Law 5 (2010): 45-62.
- Marc Liberatore, Robert Erdely, Thomas Kerle, Brian Neil Levine, Clay Shields. "Forensic Investigation of Peer-to-peer File Sharing Networks." Digital Investigations 7 (2010).
http://www.dfrws.org/2010/proceedings/2010-311.pdf
- Marcus K. Rogers, James Goldman, Rick Mislan, Timothy Wedge. "Computer Forensics Field Triage Process Model." Conference on Digital Forensics, Security and Law (2006): 27-40.
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.169.1878
- Matthew G. Kirschenbaum, , Richard Ovenden, and Gabriela Redwine. Digital Forensics and Born-Digital Content in Cultural Heritage Collections. Washington, DC: Council on Library and Information Resources, 2010.
- Matthew Meyers, Marc Rogers. "Computer Forensics: The Need for Standardization and Certification." International Journal of Digital Evidence 3. Fall. (2004): 1-11.
http://www2.tech.purdue.edu/cpt/courses/TECH581A/meyersrogers_ijde.pdf
- Mayer - Brown. Metadata Associated with Email and Documents on Employee’s Personal Computer Are Deemed Records to be Retained and Produced: legal update. USA: Mayer - Brown, Nov. 11, 2010.
- McCombie, S. and M. Warren. "Computer Forensic: An Issue of Definitions." 1st Australian Computer, Network & Information Forensics Conference 2003, Perth, Western Australia, November 2003.
http://scissec.scis.ecu.edu.au/wordpress/conference_proceedings/2003/forensics/
- Ministry of Attorney General. Consultation on Reforming the Limitation Act. September 15, 2010.
http://www.ag.gov.bc.ca/legislation
- Mocas, Sarah. "Building Theoretical Underpinnings for Digital Forensics Research." Digital Investigation 1. 1. (2004): 61-68.
www.elsevier.com/locate/diin
- Nance, Kara, Helen Armstrong, and Colin Armstrong. "Digital Forensics: Defining an Education Agenda." 43rd Hawaii International Conference on System Sciences - 2010, Hawaii, 2010.
http://www.computer.org/portal/web/csdl/doi/10.1109/HICSS.2010.151
- National Institute of Justice. "Computer Forensics Tool Testing Program". http://www.nij.gov/topics/forensics/evidence/digital/standards/cftt.htm, accessed (2012/02/23).
- Noblett, Michael G., Mark M. Pollitt, and Lawrence A. Presley. "Recovering and Examining Computer Forensic Evidence." Forensic Science Communications 2. October. (2000).
http://www.fbi.gov/about-us/lab/forensic-science-communications/
- Nutter, Beverley. "Pinpointing TomTom location records: A forensic analysis." Digital Investigation 5 (2008): 10-18.
- Palmer, Gary. A Road Map for Digital Forensic Research
Report From the First Digital Forensic Research Workshop (DFRWS). Utica, NY: Sponsored By AFRL/IFGB Air Force Research Laboratory, Rome Research Site Information Directorate/Defensive Information Warfare Branch, November 6, 2001.
- Palmer, Gary L. "Forensic Analysis in the Digital World." International Journal of Digital Evidence 1. 1. .
www.ijdc.org/docs/IJDE_1.3.doc
- Park, Jungheum, and Lee, Sangjin. "Forensic investigation of Microsoft PowerPoint files." Digital Investigation 6 (2009): 16-24.
- Pollitt, Mark. "A History of Digital Forensics." IFIP Advances in Information and Communication Technology 337 (2010): 3-15.
http://www.springerlink.com/content/gr3v34n5248r7x28/
- Pollitt, Mark. "Applying Traditional Forensic Taxonomy to Digital Forensics." IFIP International Federation for Information Processing 285 (2008): 17-26.
http://www.springerlink.com/content/0170312257u0h051/
- Reith, Mark, Clint Carr, and Gregg Gunsch. "An Examination of Digital Forensic Models." International Journal of Digital Evidence 1. 3. (Fall 2002).
- Ricci S.C. Ieong. "FORZA – Digital Forensics Investigation Framework that Incorporate Legal Issues." Digital Investigations 3S (2006): S29-S36.
- Scientific Working Group on Imaging Technology (SWGIT). "Best Practices for Archiving Digital and Multimedia Evidence (DME) in the Criminal Justice System." Forensic Science Communications 10 (April 2008).
http://www.fbi.gov/hq/lab/fsc/backissu/april2008/standards/2008_04_standards03.htm
- Scientific Working Group on Imaging Technology (SWGIT). (2008). Best Practices for Image Authentication.
http://www2.fbi.gov/hq/lab/fsc/backissu/april2008/standards/2008_04_standards02.htm
- Scientific Working Group on Imaging Technology (SWGIT).. "Best Practices for Maintaining the Integrity of Digital Images and Digital Video." Forensic Science Communications 10. April. (2008).
http://www.fbi.gov/about-us/lab/forensic-science-communications/
- Simson L. Garfinkel. "Digital Forensics Research: The Next 10 Years." Digital Investigations 7 (2010): S64-S73.
http://www.dfrws.org/2010/proceedings/2010-308.pdf
- Siti Rahayu Selamat, Robiah Yusof, Shahrin Sahib. "Mapping Process of Digital Forensic Investigation Framework." International Journal of Computer Science and Network Security 8. October. (2008): 163-169.
- Stretton, Tracey. "International electronic disclosure." Digital Investigation 3 (2006): 115-117.
- Taylor, Carol, Barbara Endicott-Popovsky, and Deborah A. Frincke. "Specifying digital forensics: A forensics policy approach." Digital Investigation 4. Suplemental. (2007): S101-S104.
- Turner, Philip. "Digital provenance e interpretation, verification and corroboration." Digital Investigation 2 (2005): 45-49.
- Turner, Philip. "Unification of digital evidence from disparate sources (Digital Evidence Bags)." Digital Investigation 2 (2005): 223-228.
- Venansius Baryamureeba, Florence Tushabe. "The Enhanced Digital Investigation Process Model." Digital Forensic Research Workshop (2004): 1-9.
- Wardwell, James, and G. Stevenson Smith. "Recovering erased digital evidence from CD-RW discs in a child exploitation investigation." Digital Investigation 5 (2008): 6-9.
- Wayne Jansen and Aurélien Delaitre. Mobile Forensic Reference Materials: A Methodology and Reification. Gaithersburg, MD: Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, October 2009. 30.