Windows Forensics Analysis, 2009. ,
Anomaly detection, ACM Computing Surveys, vol.41, issue.3, 2009. ,
DOI : 10.1145/1541880.1541882
Overwriting Hard Drive Data: The Great Wiping Controversy, Lecture Notes in Computer Science, vol.5352, pp.243-257, 2008. ,
Automatic and Selective Deletion Resistant Against Forensics Analysis, Proceedings of the 2011 International Conference on Broadband, Wireless Computing, Communication and Applications, pp.392-398, 2011. ,
Automated Construction of a False Digital Alibi, Proceedigns of ARES 2011, pp.359-373, 2011. ,
DOI : 10.1007/978-3-642-23300-5_28
The Forensic Analysis of a False Digital Alibi, Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing IEEE 2012, 2012. ,
Forensic identification using skin bacterial communities, Proceedings of the National Academy of Sciences, 2010. ,
DOI : 10.1111/j.1442-9993.1993.tb00438.x
URL : http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2852011
Data Remanence in Semiconductor Devices Secure Deletion of Data from Magnetic and Solid-State Memory, Usenix Security Symposium Sixth USENIX Security Symposium Proceedings, 1996. ,
The Windows Registry as a forensic artefact: Illustrating evidence collection for Internet usage, Digital Investigation, pp.166-173, 2006. ,
DOI : 10.1016/j.diin.2006.07.001
Advanced File Carving Approaches for Multimedia Files, Ubiquitous Computing, and Dependable Applications, pp.42-58, 2011. ,
Combining Baiting and User Search Profiling Techniques for Masquerade Detection, Ubiquitous Computing , and Dependable Applications, pp.13-29, 2012. ,
DOI : 10.1007/978-3-642-23644-0_10
The 'CSI Effect': Does It Really Exist?, National Institute of Justice Journal No, vol.259, 2008. ,
DOI : 10.1037/e444972008-001
Operating System Concepts, 2004. ,
http://www.merriam-webster.com/ 23. Wikipedia, KVM switch. http://en.wikipedia.org/wiki/KVM switch 24. NIST Special Publication 800-88: Guidelines for Media Sanitization, p.7, 2006. ,