共 100 条
- [91] Reza M., A standardised data acquisition process model for digital forensic investigations, Int'l Journal of Information Computer Security, 9, 3, pp. 229-249, (2017)
- [92] Wei R, Hai J., Modeling the network forensics behaviors, Proc. of the Workshop of the 1st Int'l Conf. on Security and Privacy for Emerging Areas in Communication Networks, pp. 1-8, (2005)
- [93] Kent K, Chevalier S, Grance T, Dang H., Guide to integrating forensic techniques into incident response, pp. 26-29, (2006)
- [94] Freiling F, Schwittay B., A common process model for incident response and computer forensics, Proc. of the SIG SIDAR Conf. on IT-incidents Management & IT-forensics 2007, pp. 19-40, (2007)
- [95] Pilli ES, Joshi RC, Niyogi R., Network forensic frameworks: Survey and research challenges, Digital Investigation, 7, 1, pp. 14-27, (2010)
- [96] Kaur P, Bijalwan A, Joshi RC, Awasthi A., Network forensic process model and framework: An alternative scenario, Proc. of the Intelligent Communication, Control and Devices, pp. 493-502, (2018)
- [97] Lin C, Li ZT, Gao CX, Liu YS., Modeling and analyzing dynamic forensics system based on intrusion tolerance, Proc. of the 9th IEEE Int'l Conf. on Computer & Information Technology, pp. 230-235, (2009)
- [98] Reza M, Richard H, Victoria C, Amin HF., The standardised digital forensic investigation process model (SDFIPM), Proc. of the Blockchain and Clinical Trial: Securing Patient Data, pp. 169-209, (2019)
- [99] Ding LP, Liu WM, Qiu XF, Et al., The study of detection, response and forensics of malicious behaviors in cloud computing, pp. 153-158, (2018)
- [100] Li JR, Li XY, Gao YL, Gao YQ, Gao YQ, Fang BX., Review on data forwarding model in Internet of things, Ruan Jian Xue Bao/ Journal of Software, 29, 1, pp. 196-224, (2018)