Experience with Engineering a Network Forensics System, Proc. of the 2005 Int. Conf. on Information Networking, 2005. ,
DOI : 10.1007/978-3-540-30582-8_7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.87.7678
Digital forensic research: The good, the bad and the unaddressed Advances in Digital Forensics V, of IFIP Advances in Information and Communication Technology, pp.17-36, 2009. ,
Cloud Computing: The impact on digital forensic investigations, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST), 2009. ,
DOI : 10.1109/ICITST.2009.5402561
Technical Challenges of Forensic Investigations in Cloud Computing Environments, Cryptography and Security in Clouds, pp.1-6, 2011. ,
Cloud Computing: Benefits, Risks and Recommendations for Information Security, ENISA Technical Report, 2009. ,
DOI : 10.1007/978-3-642-16120-9_9
PyFlag ??? An advanced network forensic framework, Digital Investigation, vol.5, pp.112-120, 2008. ,
DOI : 10.1016/j.diin.2008.05.016
Incident Detection for Cloud Environments, The Third International Conference on Emerging Network Intelligence, pp.100-105, 2011. ,
DOI : 10.1109/cloudcom.2011.35
Terra, ACM SIGOPS Operating Systems Review, vol.37, issue.5, pp.193-206, 2003. ,
DOI : 10.1145/1165389.945464
Cyber Forensics in the Cloud, IAnewsletter, vol.14, issue.1, pp.1-36, 2011. ,
Towards incident handling in the cloud, Proceedings of the 2010 ACM workshop on Cloud computing security workshop, CCSW '10, pp.77-85, 2010. ,
DOI : 10.1145/1866835.1866850
Understanding Cloud Computing Vulnerabilities, IEEE Security & Privacy Magazine, vol.9, issue.2, pp.50-57, 2011. ,
DOI : 10.1109/MSP.2010.115
FORWEB: File Fingerprinting for Automated Network Forensics Investigations, Proceedings of the 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, 2008. ,
DOI : 10.4108/e-forensics.2008.2774
Cloud Security and Privacy ? An Enterprise Perspecive on Risks and Compliance. O'Reilly Media, 2009. ,
Recovering and examining computer forensic evidence, Forensic Science Communications, vol.2, issue.4, 2000. ,
Data reduction by identification and correlation of TCP/IP attack attributes for network forensics, Proceedings of the International Conference & Workshop on Emerging Trends in Technology, ICWET '11, pp.276-283, 2011. ,
DOI : 10.1145/1980022.1980085
Network forensics and traffic monitoring, Computer security journal, pp.35-39, 1997. ,
Cloud Forensics Advances in Digital Forensics VII 361, pp.35-46, 2011. ,
Towards trusted cloud computing, Proceedings of the 2009 conference on Hot topics in cloud computing. HotCloud'09, 2009. ,
Guide to intrusion detection and prevention systems, NIST Special Publication, vol.800, p.94, 2007. ,
DOI : 10.6028/NIST.SP.800-94
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.259.5143
A Comparison and Critique of Eucalyptus, Open- Nebula and Nimbus, 2010 IEEE Second International Conference on Cloud Computing Technology and Science, pp.417-426, 2010. ,
ForNet: A Distributed Forensics Network, Second International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, 2003. ,
DOI : 10.1007/978-3-540-45215-7_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.219.6477
All your clouds are belong to us, Proceedings of the 3rd ACM workshop on Cloud computing security workshop, CCSW '11, 2011. ,
DOI : 10.1145/2046660.2046664
Design and implementation of a network forensics system for Linux, 2010 International Computer Symposium (ICS2010), pp.390-395, 2010. ,
DOI : 10.1109/COMPSYM.2010.5685481
Digital Forensics for Eucalyptus, 2011 Frontiers of Information Technology, pp.110-116, 2011. ,
DOI : 10.1109/FIT.2011.28