M. Bunge, Philosophy of Science: From Problem to Theory, Volume One, Transaction Publishers, 1998.

B. Carrier, A Hypothesis-Based Approach to Digital Forensic Investigations, 2006.

E. Casey, COMPUTER CRIME AND DIGITAL EVIDENCE, 2011.
DOI : 10.1016/B0-12-369399-3/00062-8

F. Cohen, Digital Forensic Evidence Examination, 2010.
URL : https://hal.archives-ouvertes.fr/hal-01060607

S. Garfinkel, P. Farrell, V. Roussev, and G. Dinolt, Bringing science to digital forensics with standardized forensic corpora, Digital Investigation, pp.2-11, 2009.
DOI : 10.1016/j.diin.2009.06.016

URL : https://calhoun.nps.edu/bitstream/10945/42159/1/garfinkel_bringing_science.pdf

P. Gladyshev and A. Patel, Formalizing event time bounding in digital investigations, International Journal of Digital Evidence, vol.4, issue.2, 2005.

C. Grobler, C. Louwrens, and S. Solms, A Multi-component View of Digital Forensics, 2010 International Conference on Availability, Reliability and Security, pp.647-652, 2010.
DOI : 10.1109/ARES.2010.61

L. Haber and R. Haber, Scientific validation of fingerprint evidence under Daubert, Law, Probability and Risk, pp.87-109, 2008.

K. Inman and N. Rudin, Principles and Practice of Criminalistics: The Profession of Forensic Science, 2000.
DOI : 10.1201/9781420036930

M. Kwan, K. Chow, F. Law, and P. Lai, Reasoning About Evidence Using Bayesian Networks, Advances in Digital Forensics IV, pp.275-289, 2008.
DOI : 10.1007/978-0-387-84927-0_22

URL : https://hal.archives-ouvertes.fr/hal-01523702

L. Post, Six now face charges in CT lottery scheme (www. lotterypost, 2016.

M. Lottery, What is 5 card cash? Baltimore, Maryland (www. mdlottery.com/games, p.2017

M. Olivier, On complex crimes and digital forensics, in Information Security in Diverse Computing Environments, IGI Global, pp.230-244, 2013.

M. Olivier, Combining fundamentals, traditions, practice and science in a digital forensics course, presented at the South African Computer Lecturers' Association Conference, 2014.

M. Olivier, Towards a digital forensic science, 2015 Information Security for South Africa (ISSA), 2015.
DOI : 10.1109/ISSA.2015.7335077

M. Olivier and S. Gruner, On the scientific maturity of digital forensics research, in Advances in Digital Forensics, pp.33-49, 2013.

O. Oyelami and M. Olivier, USING YIN???S APPROACH TO CASE STUDIES AS A PARADIGM FOR CONDUCTING EXAMINATIONS, Advances in Digital Forensics XI, pp.45-59, 2015.
DOI : 10.1007/978-3-319-24123-4_3

URL : https://hal.archives-ouvertes.fr/hal-01449070

J. Pearl, Causality: Models, Reasoning and Inference, 2009.
DOI : 10.1017/CBO9780511803161

M. Pollitt, Digital Forensics as a Surreal Narrative, Advances in Digital Forensics V, pp.3-15, 2009.
DOI : 10.1201/9780849383298

M. Pollitt, History, historiography and the hermeneutics of the hard drive, in Advances in Digital Forensics, pp.3-17, 2013.

S. Tewelde, M. Olivier, and S. Gruner, NOTIONS OF HYPOTHESIS IN DIGITAL FORENSICS, Advances in Digital Forensics XI, pp.29-43, 2015.
DOI : 10.1007/978-3-319-24123-4_2

URL : https://hal.archives-ouvertes.fr/hal-01449069

S. Willassen, Hypothesis-based investigation of digital timestamps, in Advances in Digital Forensics IV, I, pp.75-86, 2008.

R. Yin, Applications of Case Study Research, 2012.

R. Yin, Case Study Research: Design and Methods, 2013.

T. Young, Forensic Science and the Scientific Method, Heartland Forensic Pathology, Kansas City, Missouri (www.heartla ndforensic.com/writing/forensic-science-and-the-scienti fic-method), 2007.