R. Blincoe, Police sitting on forensic backlog risk, says top ecop , The Register (www.theregister.co.uk, 2009.

F. Cohen, Two Models of Digital Forensic Examination, 2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering, pp.42-53, 2009.
DOI : 10.1109/SADFE.2009.8

L. Gomez, Triage in-Lab: Case backlog reduction with forensic digital profiling, Proceedings of the Argentine Conference on Informatics and Argentine Symposium on Computing and Law, pp.217-225, 2012.

D. Heckerman, A Tutorial on Learning with Bayesian Networks, 1996.
DOI : 10.1007/978-94-011-5014-9_11

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.8434

M. Kwan, K. Chow, F. Law, and P. Lai, Reasoning About Evidence Using Bayesian Networks, Advances in Digital Forensics IV, pp.275-289, 2008.
DOI : 10.1007/978-0-387-84927-0_22

R. Overill, M. Kwan, K. Chow, P. Lai, and F. Law, A Cost-Effective Model for Digital Forensic Investigations, Advances in Digital Forensics V, pp.231-240, 2009.
DOI : 10.1109/MCS.2001.939938

R. Overill and J. Silomon, Digital meta-forensics: Quantifying the investigation, Proceedings of the Fourth International Conference on Cybercrime Forensics Education and Training, 2010.

J. Pearl, Probabilistic Reasoning in Intelligent Systems, 1997.

M. Rogers, J. Goldman, R. Mislan, T. Wedge, and S. Debrota, Computer Forensics Field Triage Process Model, The Journal of Digital Forensics, Security and Law, vol.1, issue.2, pp.19-37, 2006.
DOI : 10.15394/jdfsl.2006.1004

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.169.1878

R. Sullivan and H. Delaney, Criminal investigations ? A decisionmaking process, Journal of Police Science and Administration, vol.10, issue.3, pp.335-343, 1982.

H. Tse, K. Chow, and M. Kwan, Reasoning about Evidence using Bayesian Networks, Advances in Digital Forensics VIII, pp.99-113, 2012.
DOI : 10.1007/978-3-642-33962-2_7

Y. Xiang and Z. Li, An Analytical Model for DDoS Attacks and Defense, 2006 International Multi-Conference on Computing in the Global Information Technology, (ICCGI'06), p.66, 2006.
DOI : 10.1109/ICCGI.2006.7