Detecting threatening insiders with lightweight media forensics, 2013 IEEE International Conference on Technologies for Homeland Security (HST), pp.86-92, 2013. ,
DOI : 10.1109/THS.2013.6698981
URL : http://hdl.handle.net/10945/44319
Bringing science to digital forensics with standardized forensic corpora, Digital Investigation, pp.2-11, 2009. ,
DOI : 10.1016/j.diin.2009.06.016
URL : http://www.dtic.mil/get-tr-doc/pdf?AD=ADA549473
Personal communication, Webster Groves Police Department, 2014. ,
Recovery of Encryption Keys from Memory Using a Linear Scan, 2008 Third International Conference on Availability, Reliability and Security, pp.1369-1376, 2008. ,
DOI : 10.1109/ARES.2008.109
Building better passwords using probabilistic techniques, Proceedings of the 28th Annual Computer Security Applications Conference on, ACSAC '12, pp.109-118, 2012. ,
DOI : 10.1145/2420950.2420966
China Software Developer Network (CSDN) 6 million user data leaked, The Hacker News, 2011. ,
Password Recovery Using an Evidence Collection Tool and Countermeasures, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), pp.97-102, 2007. ,
DOI : 10.1109/IIH-MSP.2007.238
A Study of Probabilistic Password Models, 2014 IEEE Symposium on Security and Privacy, pp.689-704, 2014. ,
DOI : 10.1109/SP.2014.50
Doing Things with Words, Part Two: Sentence Boundary Detection, 2008. ,
Google Chrome Password Recovery Tool (www.bitbucket. org, p.2012 ,
If your password is 123456, just make it HackMe, 2010. ,
Password Cracking Using Probabilistic Context-Free Grammars, 2009 30th IEEE Symposium on Security and Privacy, pp.391-405, 2009. ,
DOI : 10.1109/SP.2009.8