Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis, 2008 Third International Conference on Availability, Reliability and Security, pp.1361-1368, 2008. ,
DOI : 10.1109/ARES.2008.122
Handbook of Computer Crime Investigation: Forensic Tools and Technology, 2002. ,
AnyLogic 6: Multi-Paradigm Simulation Software, Cherry Hill ,
A Theoretical Framework for Organizational Network Forensic Readiness, Journal of Computers, vol.2, issue.3, pp.1-11, 2007. ,
DOI : 10.4304/jcp.2.3.1-11
URL : http://www.academypublisher.com/jcp/vol02/no03/jcp02030111.pdf
Computer forensics laboratory and tools, Journal of Computing Sciences in Colleges, vol.20, issue.6, pp.143-150, 2005. ,
Computer Forensics: Evidence Collection and Management, 2007. ,
A ten step process for forensic readiness, International Journal of Digital Evidence, vol.2, issue.3, 2004. ,
Guide to Securing Legacy IEEE 802.11 Wireless Networks, NIST Special Publication 800-48, Revision 1, National Institute of Standards and Technology, 2008. ,
DOI : 10.6028/nist.sp.800-48r1
Wireless forensics: Tapping the air ? Part one, Symantec Corporation, Mountain View, 2007. ,
Forensic readiness: Strategic thinking on incident response, presented at the Second Annual CanSecWest Conference, 2001. ,
Examining wireless access points and associated devices, Forensic Focus (www.forensicfocus.com/downloads/examining-wire less-access-points, 2006. ,
The 802.11 technology gap ? Case studies in crime, Proceedings of the IEEE Region 10 Conference, 2005. ,
Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), 2007. ,
DOI : 10.1109/HICSS.2007.617
Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics, 2008 Third International Conference on Availability, Reliability and Security, pp.1355-1360, 2008. ,
DOI : 10.1109/ARES.2008.135
Wireless Forensic: A New Radio Frequency Based Locating System, Proceedings of the Pacific- Asia Workshop on Cybercrime and Computer Forensics, pp.272-277, 2008. ,
DOI : 10.1007/978-3-540-69304-8_27
The Evidence Collection of DoS Attack in WLAN by Using WLAN Forensic Profiling System, 2008 International Conference on Information Science and Security (ICISS 2008), pp.197-204, 2008. ,
DOI : 10.1109/ICISS.2008.8