A. Almulhem and I. Traore, Experience with Engineering a Network Forensics System, Proc. of the 2005 Int. Conf. on Information Networking, 2005.
DOI : 10.1007/978-3-540-30582-8_7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

N. Beebe, Digital forensic research: The good, the bad and the unaddressed Advances in Digital Forensics V, of IFIP Advances in Information and Communication Technology, pp.17-36, 2009.

S. Biggs, Cloud Computing: The impact on digital forensic investigations, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST), 2009.
DOI : 10.1109/ICITST.2009.5402561

D. Birk, Technical Challenges of Forensic Investigations in Cloud Computing Environments, Cryptography and Security in Clouds, pp.1-6, 2011.

D. Catteddu and G. Hogben, Cloud Computing: Benefits, Risks and Recommendations for Information Security, ENISA Technical Report, 2009.
DOI : 10.1007/978-3-642-16120-9_9

M. I. Cohen, PyFlag ??? An advanced network forensic framework, Digital Investigation, vol.5, pp.112-120, 2008.
DOI : 10.1016/j.diin.2008.05.016

F. Doelitzscher, C. Reich, M. Knahl, and N. Clarke, Incident Detection for Cloud Environments, The Third International Conference on Emerging Network Intelligence, pp.100-105, 2011.
DOI : 10.1109/cloudcom.2011.35

T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh, Terra, ACM SIGOPS Operating Systems Review, vol.37, issue.5, pp.193-206, 2003.
DOI : 10.1145/1165389.945464

S. Glavach and D. Zimmerman, Cyber Forensics in the Cloud, IAnewsletter, vol.14, issue.1, pp.1-36, 2011.

B. Grobauer and T. Schreck, Towards incident handling in the cloud, Proceedings of the 2010 ACM workshop on Cloud computing security workshop, CCSW '10, pp.77-85, 2010.
DOI : 10.1145/1866835.1866850

B. Grobauer, T. Walloschek, and E. Stocker, Understanding Cloud Computing Vulnerabilities, IEEE Security & Privacy Magazine, vol.9, issue.2, pp.50-57, 2011.
DOI : 10.1109/MSP.2010.115

J. Haggerty, D. Llewellyn-jones, and M. Taylor, FORWEB: File Fingerprinting for Automated Network Forensics Investigations, Proceedings of the 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, 2008.
DOI : 10.4108/e-forensics.2008.2774

T. Mather, S. Kumaraswamy, and S. Latif, Cloud Security and Privacy ? An Enterprise Perspecive on Risks and Compliance. O'Reilly Media, 2009.

M. G. Noblett, M. M. Pollitt, and L. A. Presley, Recovering and examining computer forensic evidence, Forensic Science Communications, vol.2, issue.4, 2000.

E. S. Pilli, R. C. Joshi, and R. Niyogi, Data reduction by identification and correlation of TCP/IP attack attributes for network forensics, Proceedings of the International Conference & Workshop on Emerging Trends in Technology, ICWET '11, pp.276-283, 2011.
DOI : 10.1145/1980022.1980085

M. J. Ranum, Network forensics and traffic monitoring, Computer security journal, pp.35-39, 1997.

K. Ruan, J. Carthy, T. Kechadi, and M. Crosbie, Cloud Forensics Advances in Digital Forensics VII 361, pp.35-46, 2011.

N. Santos, K. P. Gummadi, and R. Rodrigues, Towards trusted cloud computing, Proceedings of the 2009 conference on Hot topics in cloud computing. HotCloud'09, 2009.

K. Scarfone and P. Mell, Guide to intrusion detection and prevention systems, NIST Special Publication, vol.800, p.94, 2007.
DOI : 10.6028/NIST.SP.800-94

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

P. Sempolinski and D. Thain, A Comparison and Critique of Eucalyptus, Open- Nebula and Nimbus, 2010 IEEE Second International Conference on Cloud Computing Technology and Science, pp.417-426, 2010.

K. Shanmugasundaram, N. Memon, and A. Savant, ForNet: A Distributed Forensics Network, Second International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, 2003.
DOI : 10.1007/978-3-540-45215-7_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

J. Somorovsky, M. Heiderich, and M. Jensen, All your clouds are belong to us, Proceedings of the 3rd ACM workshop on Cloud computing security workshop, CCSW '11, 2011.
DOI : 10.1145/2046660.2046664

H. M. Wang and C. H. Yang, Design and implementation of a network forensics system for Linux, 2010 International Computer Symposium (ICS2010), pp.390-395, 2010.
DOI : 10.1109/COMPSYM.2010.5685481

A. Zafarullah, F. Anwar, and Z. , Digital Forensics for Eucalyptus, 2011 Frontiers of Information Technology, pp.110-116, 2011.
DOI : 10.1109/FIT.2011.28