. Run, C:\Program files\Mozilla Firefox\ firefox.exe") Send ("^t") Send

W. .. Send, Sleep (12940), WinWaitActive("Facebook") Send ("{TAB}") Send ("castiglione@ieee.org") Send

S. Internet-world, The New York Times, I'm Innocent. Just Check My Status on Facebook, internetworldstats.com/stats.htm 2. D. Beltrami, 2009.

V. Juarez and C. , Facebook status update provides alibi, 2009.

P. Gutmann, Secure Deletion of Data from Magnetic and Solid-State Memory, Sixth USENIX Security Symposium Proceedings, 1996.

N. Fierer, C. L. Lauber, N. Zhou, D. Mcdonald, E. K. Costello et al., Forensic identification using skin bacterial communities, Proceedings of the National Academy of Sciences, 2010.
DOI : 10.1111/j.1442-9993.1993.tb00438.x

J. Bennett, AutoIt v3.3.6.0, 2010.

G. , D. Crescenzo, A. Ghosh, A. Kampasi, R. Talpade et al., Detecting anomalies in active insider stepping stone attacks, Journal of Wireless Mobile Networks , Ubiquitous Computing, and Dependable Applications, pp.103-120, 2011.

V. Mee, T. Tryfonas, and I. Sutherland, The Windows Registry as a forensic artefact: Illustrating evidence collection for Internet usage, Digital Investigation, vol.3, issue.3, pp.166-173, 2006.
DOI : 10.1016/j.diin.2006.07.001

V. Chandola, A. Banerjee, and V. Kumar, Anomaly detection, ACM Computing Surveys, vol.41, issue.3, pp.1-1558, 2009.
DOI : 10.1145/1541880.1541882

D. E. Shelton, The 'CSI Effect': Does It Really Exist?, National Institute of Justice, 2008.

M. Dictionary, merriam-webster.com/dictionary/alibi 15, en.wikipedia.org/wiki/KVM switch 16. H. Carvey, Windows Forensics Analysis, 2009.

W. Craig, K. Dave, and S. R. Shyaam, Overwriting Hard Drive Data: The Great Wiping Controversy, Lecture Notes in Computer Science, vol.5352, pp.243-257, 2008.

A. Castiglione, G. Cattaneo, and G. , De Maio and A. De Santis, Automatic, Selective and Secure Deletion of Digital Evidence, 2011.

M. A. Berger, Wrought?, American Journal of Public Health, vol.95, issue.S1, pp.59-65, 2005.
DOI : 10.2105/AJPH.2004.044701