Difference between revisions of "Bibliography"

From ForensicsWiki
Jump to: navigation, search
m (fixed links now that blacklist program is working again.)
m (fixed typos)
Line 15: Line 15:
 
=Other Papers=
 
=Other Papers=
  
* [http://citeseer.ist.psu.edu/shanmugasundaram03automatic.html] Automatic Reassembly of Document Fragments via Context Based Statistical Models, Kulesh Shanmugasundaram and Nasir Memon.  
+
* [http://citeseer.ist.psu.edu/shanmugasundaram03automatic.html  Automatic Reassembly of Document Fragments via Context Based Statistical Models], Kulesh Shanmugasundaram and Nasir Memon.  
  
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=531782
+
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=531782 A Model for When Disclosure Helps Security: What is Different About Computer and Network Security?], Peter P. Swire, Moritz College of Law of the Ohio State University, Journal on Telecommunications and High Technology Law, Vol. 2, 2004.
A Model for When Disclosure Helps Security: What is Different About Computer and Network Security?], Peter P. Swire, Moritz College of Law of the Ohio State University, Journal on Telecommunications and High Technology Law, Vol. 2, 2004.
+

Revision as of 18:32, 2 September 2006

Disk Disposal and Data Recovery

Evidence Gathering

  • Byteprints: A Tool to Gather Digital Evidence, Sriranjani Sitaraman, Srinivasan Krishnamurthy and S. Venkatesan, Proceedings of the International Conference on Information Technology (ITCC 2005), Las Vegas, Nevada, USA, April 4 - 6, 2005

Fake Information

Other Papers