S. Barnum, Standardizing Cyber Threat Intelligence Information with the Structured Threat Information Expression (STIX), 2014.

D. Birk and C. Wegener, Technical issues of forensic investigations in cloud computing environments, Proceedings of the Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011.

F. Buchholz and C. Falk, Design and implementation of Zeitline: A forensic timeline editor, Proceedings of the Digital Forensics Research Workshop, 2005.

F. Buchholz and E. Spafford, On the role of file system metadata in digital forensics, Digital Investigation, vol.1, pp.298-309, 2004.

A. Case, A. Cristina, L. Marziale, G. Richard, and V. Roussev, FACE: Automated digital evidence discovery and correlation, Digital Investigation, vol.5, pp.65-75, 2008.

E. Casey, G. Back, and S. Barnum, Leveraging CybOX to standardize representation and exchange of digital forensic information, Digital Investigation, vol.12, issue.S1, pp.102-110, 2015.

E. Casey, S. Barnum, R. Griffith, J. Snyder, H. Van-beek et al., Nelson, Advancing coordinated cyber-investigations and tool interoperability using a community developed specification language, Digital Investigation, vol.22, pp.14-45, 2017.

Y. Chabot, A. Bertaux, C. Nicolle, and T. Kechadi, A complete formalized knowledge representation model for advanced digital forensics timeline analysis, Digital Investigation, vol.11, issue.S2, pp.95-105, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01199449

M. Cohen, S. Garfinkel, and B. Schatz, Extending the advanced forensic format to accommodate multiple data sources, logical evidence, arbitrary information and forensic workflow, Digital Investigation, vol.6, pp.57-68, 2009.

, Survey of Disk Image Storage Formats, Version 1.0, Digital Forensic Research Workshop, 2006.

J. Dykstra and A. Sherman, Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust and techniques, Digital Investigation, vol.9, pp.90-98, 2012.

S. Garfinkel, Digital forensics XML and the DFXML toolset, Digital Investigation, vol.8, pp.161-174, 2012.

J. Hyde and B. Moran, Alexa, are you Skynet? presented at the SANS Digital Forensics and Incident Response Summit, 2017.

, Doctrine of completeness, Wex Legal Dictionary/Encyclopedia, 2018.

M. Mabey, A. Doupé, Z. Zhao, and G. Ahn, dbling: Identifying extensions installed on encrypted web thin clients, Digital Investigation, vol.18, pp.55-65, 2016.

F. Marturana and S. Tacconi, A machine-learning-based triage methodology for automated categorization of digital media, Digital Investigation, vol.10, pp.193-204, 2013.

R. Marty, Cloud application logging for forensics, Proceedings of the ACM Symposium on Applied Computing, pp.178-184, 2011.

, Cyber Observable Expression (CybOX) Archive Website, p.2017

S. Murtuza, R. Verma, J. Govindaraj, and G. Gupta, A tool for extracting static and volatile forensic artifacts of Windows 8.x apps, Advances in Digital Forensics XI, pp.305-320, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01449065

, National Software Reference Library (NSRL), 2018.

J. Olsson and M. Boldt, Computer forensic timeline visualization tool, Digital Investigation, vol.6, pp.78-87, 2009.

J. Paglierani, M. Mabey, and G. Ahn, Towards comprehensive and collaborative forensics on email evidence, Proceedings of the Ninth International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp.11-20, 2013.

J. Rajewski, Internet of Things forensics, presented at the Endpoint Security, Forensics and eDiscovery Conference, 2017.

A. Reed and M. Kranch, Identifying HTTPS-protected Netflix videos in real-time, Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, pp.361-368, 2017.

K. Reitz, Maya: Datetimes for Humans, 2018.

V. Roussev, A. Barreto, and I. Ahmed, API-based forensic acquisition of cloud drives, Advances in Digital Forensics XII, pp.213-235, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01758692

K. Ruan, J. Carthy, T. Kechadi, M. Crosbie, and C. Forensics, Advances in Digital Forensics VII, pp.35-46, 2011.

B. Schneier and J. Kelsey, Secure audit logs to support computer forensics, ACM Transactions on Information and System Security, vol.2, issue.2, pp.159-176, 1999.

J. Stadlinger and A. Dewald, Email Communication Visualization in (Forensic) Incident Analysis, ENRW Whitepaper 59, 2017.

Z. Syed, A. Padia, T. Finin, L. Mathews, and A. Joshi, UCO: A unified cybersecurity ontology, Proceedings of the Workshop on Artificial Intelligence for Cyber Security at the Thirtieth AAAI Conference on Artificial Intelligence, pp.195-202, 2016.

C. Tassone, B. Martini, and K. Choo, Forensic visualization: Survey and future research directions, Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, pp.163-184, 2017.

S. Vandeven, Forensic Images: For Your Viewing Pleasure, 2014.

O. Vermaas, J. Simons, and R. Meijer, Open computer forensic architecture as a way to process terabytes of forensic disk images, Open Source Software for Digital Forensics, pp.45-67, 2010.