F. Adelstein, MFP: The Mobile Forensics Platform, International Journal of Digital Evidence, vol.2, issue.1, 2003.

N. Beebe and J. Clark, A hierarchical, objectives-based framework for the digital investigations process, Digital Investigation, pp.147-167, 2005.
DOI : 10.1016/j.diin.2005.04.002

B. Carrier and E. Spafford, Getting physical with the digital investigation process, International Journal of Digital Evidence, vol.2, issue.2, 2003.

E. Casey, M. Ferraro, and L. Nguyen, Investigation Delayed Is Justice Denied: Proposals for Expediting Forensic Examinations of Digital Evidence, Journal of Forensic Sciences, vol.3, issue.23, pp.1353-1364, 2009.
DOI : 10.1111/j.1556-4029.2009.01150.x

A. Fathy, A. Marrington, F. Iqbal, and I. Baggili, Testing the forensic soundness of forensic examination environments on bootable media, submitted for publication, 2014.

S. Garfinkel, A. Nelson, and J. Young, A general strategy for differential forensic analysis, Digital Investigation, pp.50-59, 2012.
DOI : 10.1016/j.diin.2012.05.003

K. Iserson and J. Moskop, Triage in Medicine, Part I: Concept, History, and Types, Annals of Emergency Medicine, vol.49, issue.3, pp.275-281, 2007.
DOI : 10.1016/j.annemergmed.2006.05.019

J. James, A. Lopez-fernandez, and P. Gladyshev, Measuring accuracy of automated investigation tools and procedures in digital investigations, presented at the Fifth International Conference on Digital Forensics and Cyber Crime, 2013.

D. Kennedy and D. Sun, How to triage computer evidence: Tackling Moore's law with less, Evidence Technology Magazine, vol.8, issue.2, p.2010

R. Mislan, E. Casey, and G. Kessler, The growing need for on-scene triage of mobile devices, Digital Investigation, pp.112-124, 2010.
DOI : 10.1016/j.diin.2010.03.001

M. Pollitt, An Ad Hoc Review of Digital Forensic Models, Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'07), pp.43-54, 2007.
DOI : 10.1109/SADFE.2007.3

M. Reith, C. Carr, and G. Gunsch, An examination of digital forensic models, International Journal of Digital Evidence, vol.1, issue.3, 2002.

G. Richard, I. , and V. Roussev, Digital Forensic Tools, IGI Global, pp.76-91, 2006.
DOI : 10.4018/978-1-59140-872-7.ch004

M. Rogers, J. Goldman, R. Mislan, T. Wedge, and S. Debrota, Computer Forensics Field Triage Process Model, Proceedings of the Conference on Digital Forensics, Security and Law, pp.27-40, 2006.
DOI : 10.15394/jdfsl.2006.1004

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.169.1878

P. Stephenson, Modeling of post-incident root cause analysis, International Journal of Digital Evidence, vol.2, issue.2, 2003.

M. Suhanov, Linux for Computer Investigators: Pitfalls of Mounting Filesystems (www.forensicfocus.com/linux-forensics-pit falls-of-mounting-file-systems), 2009.

C. Tilbury and N. $. , I30 index attributes: Evidence of deleted and overwritten files, SANS Digital Forensics and Incident Response (computer-forensics.sans.org/blogntfs-i30-i ndex-attributes-evidence-of-deleted-and-overwritten-fil es), 2011.