Difference between revisions of "Bibliography"

From ForensicsWiki
Jump to: navigation, search
m (added Peter Swire's article.)
m (fixed links now that blacklist program is working again.)
Line 15: Line 15:
 
=Other Papers=
 
=Other Papers=
  
* Automatic Reassembly of Document Fragments via Context Based Statistical Models, Kulesh Shanmugasundaram and Nasir Memon. citeseer.ist.psu.edu/shanmugasundaram03automatic.html
+
* [http://citeseer.ist.psu.edu/shanmugasundaram03automatic.html]  Automatic Reassembly of Document Fragments via Context Based Statistical Models, Kulesh Shanmugasundaram and Nasir Memon.  
  
*  A Model for When Disclosure Helps Security: What is Different About Computer and Network Security?, Peter P. Swire, Moritz College of Law of the Ohio State University, Journal on Telecommunications and High Technology Law, Vol. 2, 2004. papers.ssrn.com/sol3/papers.cfm?abstract_id=531782
+
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=531782
 +
  A Model for When Disclosure Helps Security: What is Different About Computer and Network Security?], Peter P. Swire, Moritz College of Law of the Ohio State University, Journal on Telecommunications and High Technology Law, Vol. 2, 2004.

Revision as of 18:31, 2 September 2006

Disk Disposal and Data Recovery

Evidence Gathering

  • Byteprints: A Tool to Gather Digital Evidence, Sriranjani Sitaraman, Srinivasan Krishnamurthy and S. Venkatesan, Proceedings of the International Conference on Information Technology (ITCC 2005), Las Vegas, Nevada, USA, April 4 - 6, 2005

Fake Information

Other Papers

  • [2] Automatic Reassembly of Document Fragments via Context Based Statistical Models, Kulesh Shanmugasundaram and Nasir Memon.
A Model for When Disclosure Helps Security: What is Different About Computer and Network Security?], Peter P. Swire, Moritz College of Law of the Ohio State University, Journal on Telecommunications and High Technology Law, Vol. 2, 2004.