F. Adelstein, Live forensics, Communications of the ACM, vol.49, issue.2, pp.63-66, 2005.
DOI : 10.1145/1113034.1113070

V. Baryamureeba and F. Tushabe, The enhanced digital investigation process model, Asian Journal of Information Technology, vol.5, issue.7, pp.790-794, 2006.

N. Beebe and J. Clark, A hierarchical, objectives-based framework for the digital investigations process, Digital Investigation, pp.147-167, 2005.
DOI : 10.1016/j.diin.2005.04.002

A. Bogen and D. Dampier, Unifying Computer Forensics Modeling Approaches: A Software Engineering Perspective, First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'05), pp.27-39, 2005.
DOI : 10.1109/SADFE.2005.27

G. Cantrell, D. Dampier, Y. Dandass, N. Niu, and A. Bogen, Research toward a Partially-Automated, and Crime Specific Digital Triage Process Model, Computer and Information Science, vol.5, issue.2, pp.29-38, 2012.
DOI : 10.5539/cis.v5n2p29

URL : http://doi.org/10.5539/cis.v5n2p29

B. Carrier and E. Spafford, Getting physical with the digital investigation process, International Journal of Digital Evidence, vol.2, issue.2, 2003.

B. Carrier and E. Spafford, An event-based digital forensic investigation framework, Proceedings of the Digital Forensics Research Workshop, 2004.

H. Carvey, The Windows Registry as a forensic resource, Digital Investigation, pp.201-205, 2005.
DOI : 10.1016/j.diin.2005.07.003

B. Dolan-gavitt, Forensic analysis of the Windows registry in memory, Digital Investigation, pp.26-32, 2008.
DOI : 10.1016/j.diin.2008.05.003

D. Farmer and W. Venema, Forensic Discovery, 2004.

A. Grillo, A. Lentini, G. Me, and M. Ottoni, Fast User Classifying to Establish Forensic Analysis Priorities, 2009 Fifth International Conference on IT Security Incident Management and IT Forensics, pp.69-77, 2009.
DOI : 10.1109/IMF.2009.16

K. Jones and R. Blani, Web Browser Forensics, Part 1, Symantec , Mountain View, California (www.symantec.com/connect, 2010.

K. Jones, R. Blani, and W. B. Forensics, Part 2, Symantec , Mountain View, California (www.symantec.com/connect, p.2010

W. Kruse and J. Heiser, Computer Forensics: Incident Response Essentials, 2001.

J. Oh, S. Lee, and S. Lee, Advanced evidence collection and analysis of web browser activity, Digital Investigation, pp.62-70, 2011.
DOI : 10.1016/j.diin.2011.05.008

M. Rogers, J. Goldman, R. Mislan, T. Wedge, and S. Debrota, Computer Forensics Field Triage Process Model, The Journal of Digital Forensics, Security and Law, vol.1, issue.2, pp.27-40, 2006.
DOI : 10.15394/jdfsl.2006.1004

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.169.1878