N. Beebe and J. Clark, A hierarchical, objectives-based framework for the digital investigations process, Digital Investigation, pp.147-167, 2005.
DOI : 10.1016/j.diin.2005.04.002

D. Cappelli, A. Moore, R. Trzeciak, and T. Shimeall, Common Sense Guide to Prevention and Detection of Insider Threats, Version 3, 2009.

B. Carrier and E. Spafford, Getting physical with the digital investigation process, International Journal of Digital Evidence, vol.2, issue.2, 2003.

B. Carrier and E. Spafford, An event-based digital forensic investigation framework, Proceedings of the Fourth Digital Forensics Research Workshop, 2004.

J. Howard and T. Longstaff, A Common Language for Computer Security Incidents, 1998.

R. Ieong, FORZA ??? Digital forensics investigation framework that incorporate legal issues, Digital Investigation, pp.29-36, 2006.
DOI : 10.1016/j.diin.2006.06.004

W. Mccomas, The principal elements of the nature of science: Dispelling the myths in the nature of science, in The Nature of Science in Science Education, Kluwer, pp.53-70, 1998.

G. Palmer, A Road Map for Digital Forensic Research, DFRWS Technical Report DTR ? T001-01 Final, Air Force Research Laboratory, 2001.

M. Pollitt, Computer forensics: An approach to evidence in cyberspace, Proceedings of the National Information Systems Security Conference, pp.487-491, 1995.

M. Pollitt, Six blind men from Indostan, Proceedings of the Fourth Digital Forensics Research Workshop, 2004.

M. Reith, C. Carr, and G. Gunsch, An examination of digital forensic models, International Journal of Digital Evidence, vol.1, issue.3, 2002.

S. Selamat, R. Yusof, and S. Sahib, Mapping process of digital forensic investigation framework, International Journal of Computer Science and Network Security, vol.8, issue.10, pp.163-169, 2008.

J. Sherwood, A. Clark, and D. Lynas, Enterprise Security Architecture: A Business Driven Approach, CMP Books, 2005.
DOI : 10.1201/b17776

A. Tanenbaum, Computer Networks, 2003.

J. Zachman, A framework for information systems architecture, IBM Systems Journal, vol.26, issue.3, pp.276-292, 1987.
DOI : 10.1147/sj.263.0276