S. Garfinkel, N. Beebe, L. Liu, and M. Maasberg, Detecting threatening insiders with lightweight media forensics, 2013 IEEE International Conference on Technologies for Homeland Security (HST), pp.86-92, 2013.
DOI : 10.1109/THS.2013.6698981

URL : http://hdl.handle.net/10945/44319

S. Garfinkel, P. Farrell, V. Roussev, and G. Dinolt, Bringing science to digital forensics with standardized forensic corpora, Digital Investigation, pp.2-11, 2009.
DOI : 10.1016/j.diin.2009.06.016

URL : http://www.dtic.mil/get-tr-doc/pdf?AD=ADA549473

S. Grimm, Personal communication, Webster Groves Police Department, 2014.

C. Hargreaves and H. Chivers, Recovery of Encryption Keys from Memory Using a Linear Scan, 2008 Third International Conference on Availability, Reliability and Security, pp.1369-1376, 2008.
DOI : 10.1109/ARES.2008.109

S. Houshmand and S. Aggarwal, Building better passwords using probabilistic techniques, Proceedings of the 28th Annual Computer Security Applications Conference on, ACSAC '12, pp.109-118, 2012.
DOI : 10.1145/2420950.2420966

M. Kumar, China Software Developer Network (CSDN) 6 million user data leaked, The Hacker News, 2011.

S. Lee, A. Savoldi, S. Lee, and J. Lim, Password Recovery Using an Evidence Collection Tool and Countermeasures, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), pp.97-102, 2007.
DOI : 10.1109/IIH-MSP.2007.238

J. Ma, W. Yang, M. Luo, and N. Li, A Study of Probabilistic Password Models, 2014 IEEE Symposium on Security and Privacy, pp.689-704, 2014.
DOI : 10.1109/SP.2014.50

J. O. Neil, Doing Things with Words, Part Two: Sentence Boundary Detection, 2008.

D. Riis, Google Chrome Password Recovery Tool (www.bitbucket. org, p.2012

A. Vance, If your password is 123456, just make it HackMe, 2010.

M. Weir, S. Aggarwal, B. De-medeiros, and B. Glodek, Password Cracking Using Probabilistic Context-Free Grammars, 2009 30th IEEE Symposium on Security and Privacy, pp.391-405, 2009.
DOI : 10.1109/SP.2009.8