H. Carvey, Windows Forensics Analysis, 2009.

V. Chandola, A. Banerjee, and V. Kumar, Anomaly detection, ACM Computing Surveys, vol.41, issue.3, 2009.
DOI : 10.1145/1541880.1541882

W. Craig, K. Dave, and S. R. Shyaam, Overwriting Hard Drive Data: The Great Wiping Controversy, Lecture Notes in Computer Science, vol.5352, pp.243-257, 2008.

A. Castiglione, G. Cattaneo, A. De-santis, and G. Maio, Automatic and Selective Deletion Resistant Against Forensics Analysis, Proceedings of the 2011 International Conference on Broadband, Wireless Computing, Communication and Applications, pp.392-398, 2011.

A. D. Santis, A. Castiglione, G. Cattaneo, G. De-maio, and M. Ianulardo, Automated Construction of a False Digital Alibi, Proceedigns of ARES 2011, pp.359-373, 2011.
DOI : 10.1007/978-3-642-23300-5_28

G. De-maio, A. Castiglione, G. Cattaneo, G. Costabile, A. D. Santis et al., The Forensic Analysis of a False Digital Alibi, Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing IEEE 2012, 2012.

N. Fierer, C. L. Lauber, N. Zhou, D. Mcdonald, E. K. Costello et al., Forensic identification using skin bacterial communities, Proceedings of the National Academy of Sciences, 2010.
DOI : 10.1111/j.1442-9993.1993.tb00438.x

URL : http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2852011

P. Gutmann, Data Remanence in Semiconductor Devices Secure Deletion of Data from Magnetic and Solid-State Memory, Usenix Security Symposium Sixth USENIX Security Symposium Proceedings, 1996.

V. Mee, T. Tryfonas, and I. Sutherland, The Windows Registry as a forensic artefact: Illustrating evidence collection for Internet usage, Digital Investigation, pp.166-173, 2006.
DOI : 10.1016/j.diin.2006.07.001

R. Poisel, S. Tjoa, and P. Tavolato, Advanced File Carving Approaches for Multimedia Files, Ubiquitous Computing, and Dependable Applications, pp.42-58, 2011.

M. B. Salem and S. J. Stolfo, Combining Baiting and User Search Profiling Techniques for Masquerade Detection, Ubiquitous Computing , and Dependable Applications, pp.13-29, 2012.
DOI : 10.1007/978-3-642-23644-0_10

D. E. Shelton, The 'CSI Effect': Does It Really Exist?, National Institute of Justice Journal No, vol.259, 2008.
DOI : 10.1037/e444972008-001

A. Silberschatz, P. B. Galvin, and G. Gagne, Operating System Concepts, 2004.

. Merriam-webster-online-dictionary, http://www.merriam-webster.com/ 23. Wikipedia, KVM switch. http://en.wikipedia.org/wiki/KVM switch 24. NIST Special Publication 800-88: Guidelines for Media Sanitization, p.7, 2006.