F. Beck and O. Festor, Syscall Interception in Xen Hypervisor, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00431031

D. Birk and C. Wegener, Technical Issues of Forensic Investigations in Cloud Computing Environments, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011.
DOI : 10.1109/SADFE.2011.17

J. Dykstra and A. Sherman, Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques, Digital Investigation, pp.90-98, 2012.
DOI : 10.1016/j.diin.2012.05.001

J. Dykstra and A. Sherman, Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform, Digital Investigation, pp.87-95, 2013.
DOI : 10.1016/j.diin.2013.06.010

B. Hay and K. Nance, Forensics examination of volatile system data using virtual introspection, ACM SIGOPS Operating Systems Review, vol.42, issue.3, pp.74-82, 2008.
DOI : 10.1145/1368506.1368517

S. Hofmeyr, S. Forrest, and A. Somayaji, Intrusion detection using sequences of system calls, Journal of Computer Security, vol.10, issue.1, pp.151-180, 1998.
DOI : 10.1016/0167-4048(93)90110-Q

M. Hogan, F. Liu, A. Sokol, and J. Tong, NIST Cloud Computing Standards Roadmap, NIST Special Publication 500-291, National Institute of Standards and Technology, 2011.

A. Jaquith and S. Metrics, Replacing Fear, Uncertainty and Doubt, Pearson Education, 2007.

K. Kent, S. Chevalier, T. Grance, and H. Dang, Guide to Integrating Forensic Techniques into Incident Response, NIST Special Publication 800-86, National Institute of Standards and Technology, 2006.

C. Liu, A. Singhal, and D. Wijesekera, A LOGIC-BASED NETWORK FORENSIC MODEL FOR EVIDENCE ANALYSIS, Advances in Digital Forensics XI, pp.129-145, 2015.
DOI : 10.1007/978-3-319-24123-4_8

URL : https://hal.archives-ouvertes.fr/hal-01449074

C. Liu, A. Singhal, and D. Wijesekara, A Probabilistic Network Forensic Model for Evidence Analysis, Advances in Digital Forensics XII, pp.189-210, 2016.
DOI : 10.1145/2514601.2514618

P. Mell and T. Grance, NIST Definition of Cloud Computing, NIST Special Publication 800-145, National Institute of Standards and Technology, 2011.

X. Ou, S. Govindavajhala, and A. Appel, MulVAL: A logic-based network security analyzer, Proceedings of the Fourteenth USENIX Security Symposium, 2005.

G. Palmer, A Road Map for Digital Forensic Research, 2001.

A. Pichan, M. Lazarescu, and S. Soh, Cloud forensics: Technical challenges, solutions and comparative analysis, Digital Investigation, pp.38-57, 2015.
DOI : 10.1016/j.diin.2015.03.002

X. Sun, J. Dai, P. Liu, A. Singhal, and J. Yen, Towards probabilistic identification of zero-day attack paths, 2016 IEEE Conference on Communications and Network Security (CNS), pp.64-72, 2016.
DOI : 10.1109/CNS.2016.7860471

W. Wang and T. Daniels, A Graph Based Approach Toward Network Forensics Analysis, ACM Transactions on Information and System Security, vol.12, issue.1, 2008.
DOI : 10.1145/1410234.1410238

S. Zawoad and R. Hasan, A trustworthy cloud forensics environment , in Advances in Digital Forensics XI, pp.271-285, 2015.