B. Carrier, The Sleuth Kit (www.sleuthkit.org/sleuthkit), 2013.

S. Garfinkel, Forensic corpora, a challenge for forensic research, unpublished manuscript, 2007.

S. Garfinkel, Lessons learned writing digital forensics tools and managing a 30 TB digital evidence corpus, Digital Investigation, pp.80-89, 2012.

S. Garfinkel, P. Farrell, V. Roussev, and G. Dinolt, Bringing science to digital forensics with standardized forensic corpora, Digital Investigation, pp.2-11, 2009.
DOI : 10.1016/j.diin.2009.06.016

M. Grgic and K. Delac, Face Recognition Homepage, Zagreb, Croatia (www.face-rec, p.2013

B. Klimt and Y. Yang, Introducing the Enron Corpus, presented at the First Conference on Email and Anti-Spam, 2004.

B. Klimt and Y. Yang, The Enron Corpus: A New Dataset for Email Classification Research, Proceedings of the Fifteenth European Conference on Machine Learning, pp.217-226, 2004.
DOI : 10.1007/978-3-540-30115-8_22

R. Lippmann, D. Fried, I. Graf, J. Haines, K. Kendall et al., Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, pp.12-26, 2000.
DOI : 10.1109/DISCEX.2000.821506

R. Lippmann, J. Haines, D. Fried, J. Korba, and K. Das, The 1999 DARPA off-line intrusion detection evaluation, Computer Networks, vol.34, issue.4, pp.579-595, 2000.
DOI : 10.1016/S1389-1286(00)00139-0

E. Lundin, H. Kvarnstrom, and E. Jonsson, A Synthetic Fraud Data Generation Methodology, Proceedings of the Fourth International Conference on Information and Communications Security, pp.265-277, 2002.
DOI : 10.1007/3-540-36159-6_23

E. Lundin-barse, H. Kvarnstrom, and E. Jonsson, Synthesizing test data for fraud detection systems, Proceedings of the Nineteenth Annual Computer Security Applications Conference, pp.384-394, 2003.

J. Mchugh, Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory, ACM Transactions on Information and System Security, vol.3, issue.4, pp.262-294, 2000.
DOI : 10.1145/382912.382923

C. Moch and F. Freiling, The Forensic Image Generator Generator (Forensig2), 2009 Fifth International Conference on IT Security Incident Management and IT Forensics, pp.78-93, 2009.
DOI : 10.1109/IMF.2009.8

C. Moch and F. Freiling, Evaluating the Forensic Image Generator Generator, Proceedings of the Third International Conference on Digital Forensics and Cyber Crime, pp.238-252, 2011.
DOI : 10.1007/978-3-642-35515-8_20

K. Ricanek and T. Tesafaye, MORPH: A Longitudinal Image Database of Normal Adult Age-Progression, 7th International Conference on Automatic Face and Gesture Recognition (FGR06), pp.341-345, 2006.
DOI : 10.1109/FGR.2006.78

M. Steinebach, H. Liu, and Y. Yannikos, FaceHash: Face detection and robust hashing, presented at the Fifth International Conference on Digital Forensics and Cyber Crime, 2013.

T. Vidas, MemCorp: An Open Data Corpus for Memory Analysis, 2011 44th Hawaii International Conference on System Sciences, 2011.
DOI : 10.1109/HICSS.2011.308

. Volatilty, The Volatility Framework (code.google.com, p.2014

. Wikileaks, The Global Intelligence Files (wikileaks.org/the-gif iles.html), 2013.

K. Woods, C. Lee, S. Garfinkel, D. Dittrich, A. Russell et al., Creating realistic corpora for security and forensic education, Proceedings of the ADFSL Conference on Digital Forensics, Security and Law, 2011.

Y. Yannikos, F. Franke, C. Winter, and M. Schneider, 3LSPG: Forensic Tool Evaluation by Three Layer Stochastic Process-Based Generation of Data, Proceedings of the Fourth International Conference on Computational Forensics, pp.200-211, 2010.
DOI : 10.1007/3-540-36159-6_23

Y. Yannikos and C. Winter, Model-Based Generation of Synthetic Disk Images for Digital Forensic Tool Testing, 2013 International Conference on Availability, Reliability and Security, pp.498-505, 2013.
DOI : 10.1109/ARES.2013.65

Y. Yannikos, C. Winter, and M. Schneider, Synthetic Data Creation for Forensic Tool Testing: Improving Performance of the 3LSPG Framework, 2012 Seventh International Conference on Availability, Reliability and Security, pp.613-619, 2012.
DOI : 10.1109/ARES.2012.46