D. Blog, 4094 Security Events Lane (eventlogs. blogspot.com, 2007.

X. Fu, N. Zhang, A. Pingley, W. Yu, J. Wang et al., The Digital Marauder's Map: A WiFi Forensic Positioning Tool, IEEE Transactions on Mobile Computing, vol.11, issue.3, pp.377-389, 2012.
DOI : 10.1109/TMC.2011.70

N. Hashim and I. Sutherland, An Architecture for the Forensic Analysis of Windows System Artifacts, Proceedings of the Second International ICST Conference on Digital Forensics and Cyber Crime, pp.120-128, 2011.
DOI : 10.1016/j.diin.2006.06.010

N. Ibrahim, A. Al-nemrat, H. Jahankhani, and R. Bashroush, Sufficiency of Windows Event Log as Evidence in Digital Forensics, Proceedings of the Seventh International Conference on Global Security , Safety and Sustainability and the Fourth Conference on e- Democracy, pp.253-262, 2011.
DOI : 10.1007/978-3-642-33448-1_34

K. Kent, S. Chevalier, T. Grance, and H. Dang, Guide to Integrating Forensic Techniques into Incident Response, NIST Special Publication 800-86, National Institute of Standards and Technology, 2006.

A. Marrington, G. Mohay, A. Clark, and H. Morarji, Event-based computer profiling for the forensic reconstruction of computer activity, Proceedings of the AusCERT Asia Pacific Information Technology Security Conference, pp.71-87, 2007.

R. Mckemmish, What is forensic computing? Trends and Issues in Crime and Criminal Justice, pp.1-6, 1999.

. Microsoft, Audit Security State Change, p.2013

. Microsoft, Windows 7 Product Guide, p.2014

R. Murphey, Automated Windows event log forensics, Digital Investigation, pp.92-100, 2007.
DOI : 10.1016/j.diin.2007.06.012

J. Newman, Windows 8 grabs more market share, but so do older versions, PC World, 2013.

A. Schuster, Introducing the Microsoft Vista event log file format, Digital Investigation, pp.65-72, 2007.
DOI : 10.1016/j.diin.2007.06.015