Syscall Interception in Xen Hypervisor, 2009. ,
URL : https://hal.archives-ouvertes.fr/inria-00431031
Technical Issues of Forensic Investigations in Cloud Computing Environments, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011. ,
DOI : 10.1109/SADFE.2011.17
Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques, Digital Investigation, pp.90-98, 2012. ,
DOI : 10.1016/j.diin.2012.05.001
Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform, Digital Investigation, pp.87-95, 2013. ,
DOI : 10.1016/j.diin.2013.06.010
Forensics examination of volatile system data using virtual introspection, ACM SIGOPS Operating Systems Review, vol.42, issue.3, pp.74-82, 2008. ,
DOI : 10.1145/1368506.1368517
Intrusion detection using sequences of system calls, Journal of Computer Security, vol.10, issue.1, pp.151-180, 1998. ,
DOI : 10.1016/0167-4048(93)90110-Q
NIST Cloud Computing Standards Roadmap, NIST Special Publication 500-291, National Institute of Standards and Technology, 2011. ,
Replacing Fear, Uncertainty and Doubt, Pearson Education, 2007. ,
Guide to Integrating Forensic Techniques into Incident Response, NIST Special Publication 800-86, National Institute of Standards and Technology, 2006. ,
A LOGIC-BASED NETWORK FORENSIC MODEL FOR EVIDENCE ANALYSIS, Advances in Digital Forensics XI, pp.129-145, 2015. ,
DOI : 10.1007/978-3-319-24123-4_8
URL : https://hal.archives-ouvertes.fr/hal-01449074
A Probabilistic Network Forensic Model for Evidence Analysis, Advances in Digital Forensics XII, pp.189-210, 2016. ,
DOI : 10.1145/2514601.2514618
NIST Definition of Cloud Computing, NIST Special Publication 800-145, National Institute of Standards and Technology, 2011. ,
MulVAL: A logic-based network security analyzer, Proceedings of the Fourteenth USENIX Security Symposium, 2005. ,
A Road Map for Digital Forensic Research, 2001. ,
Cloud forensics: Technical challenges, solutions and comparative analysis, Digital Investigation, pp.38-57, 2015. ,
DOI : 10.1016/j.diin.2015.03.002
Towards probabilistic identification of zero-day attack paths, 2016 IEEE Conference on Communications and Network Security (CNS), pp.64-72, 2016. ,
DOI : 10.1109/CNS.2016.7860471
A Graph Based Approach Toward Network Forensics Analysis, ACM Transactions on Information and System Security, vol.12, issue.1, 2008. ,
DOI : 10.1145/1410234.1410238
A trustworthy cloud forensics environment , in Advances in Digital Forensics XI, pp.271-285, 2015. ,