Difference between pages "Cloud Forensics Bibliography" and "Compression"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
 
(LZXPRESS)
 
Line 1: Line 1:
'''In chronological order, most recent to oldest'''
+
{{Expand}}
  
 +
== LZ-based ==
  
<bibtex>
+
=== LZNT1 ===
@inproceedings{OrtonLegalCloud,
+
Used in:
Author = {Ivan Orton and Aaron Alva and Barbara Endicott-Popovsky},
+
* [[NTFS]]
title = {Legal Process and Requirements for Cloud Forensic Investigations},
+
* [[Windows SuperFetch Format]]
booktitle = {Cybercrime and Cloud Forensics: Applications for Investigation Processes},
+
Editor = {K. Ruan},
+
Pages = {186-229},
+
Publisher = {IGI Global},
+
Year = {2013},
+
        url = {http://ssrn.com/abstract=2197978}}
+
</bibtex>
+
  
<bibtex>
+
=== LZXPRESS ===
@inproceedings{DykstraSeizing,
+
Used in:
Author = {Josiah Dykstra},
+
* [[Extensible Storage Engine (ESE) Database File (EDB) format]]
title = {Seizing Electronic Evidence from Cloud Computing Environments},
+
booktitle = {Cybercrime and Cloud Forensics: Applications for Investigation Processes},
+
Editor = {K. Ruan},
+
Publisher = {IGI Global},
+
Year = {2013}}
+
</bibtex>
+
  
<bibtex>
+
=== LZXPRESS Huffman ===
@book{Ruan13,
+
Used in:
  title="Cybercrime and Cloud Forensics: Applications for Investigation Processes",
+
* [[Windows SuperFetch Format]]
  author={Keyun Ruan},
+
  year={2013},
+
  publisher={IGI Global},
+
  url = {http://www.igi-global.com/book/cybercrime-cloud-forensics/69206}
+
}
+
</bibtex>
+
  
<bibtex>
+
== External Links ==
@article{DykstraJOLT,
+
* [http://en.wikipedia.org/wiki/Lempel-Ziv Wikipedia: Lempel-Ziv]
author = "Josiah Dykstra and Damien Riehl",
+
* [http://www.coderforlife.com/microsoft-compression-formats/ Microsoft Compression Formats]
title = "Forensic Collection of Electronic Evidence from Infrastructure-As-a-Service Cloud Computing",
+
journal = "Richmond Journal of Law and Technology",
+
volume = {19},
+
issue = {1},
+
year = {2012},
+
  url="http://www.cs.umbc.edu/~dykstra/Final-Dykstra-Riehl-1.pdf"
+
</bibtex>
+
  
<bibtex>
+
=== LZ1 ===
@article{Poisel2012,
+
* [http://andyh.org/LZ1.html LZ1]
  title="Discussion on the Challenges and Opportunities of Cloud Forensics",
+
  author="Rainer Poisel and Simon Tjoa",
+
  journal="Multidisciplinary Research and Practice for Information Systems",
+
  pages={593--608},
+
  year={2012},
+
  publisher={Springer}
+
</bibtex>
+
 
+
<bibtex>
+
@article{Grispos12,
+
author = "George Grispos and Tim Storer and William Bradley Glisson",
+
title = "Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics",
+
journal = "International Journal of Digital Crime and Forensics",
+
volume = {4},,
+
issue = {2},
+
year = {2012},
+
  url="http://www.dcs.gla.ac.uk/~grisposg/Papers/calm.pdf"
+
</bibtex>
+
 
+
<bibtex>
+
@article{Dykstra12,
+
author = "Josiah Dykstra and Alan T. Sherman",
+
title = "Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques",
+
journal = "Digital Investigation",
+
volume = {9},
+
year = {2012},
+
pages = {S90--S98},
+
  url="http://ww.cs.umbc.edu/~dykstra/DFRWS_Dykstra.pdf"
+
</bibtex>
+
 
+
<bibtex>
+
@inproceedings{AlvaSADFE,
+
Author = {Aaron Alva and Scott David and Barbara Endicott-Popovsky},
+
title = {Forensic Barriers: Legal Implications of Storing and Processing Information in the Cloud},
+
booktitle = {Proceedings of the 7th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE)},
+
Year = {2012}
+
        address = {Vancouver, BC}}
+
</bibtex>
+
 
+
<bibtex>
+
@inproceedings{ISSA,
+
author = "Waldo Delport and Michael Kohn and Martin S. Olivier",
+
title = "Isolating a cloud instance for a digital forensic investigation",
+
  booktitle={Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference},
+
  year={August 2011},
+
  organization={ISSA},
+
</bibtex>
+
 
+
<bibtex>
+
@article{CLSR,
+
author = "Esther George and Stephen Mason",
+
title = "Digital evidence and ‘cloud’ computing",
+
journal = "Computer Law & Security Review",
+
volume = {27},
+
issue = {5},
+
year = {September 2011},
+
pages = {524--528}
+
</bibtex>
+
 
+
<bibtex>
+
@article{dykstraJournal,
+
  author = "Josiah Dykstra and Alan. T. Sherman",
+
  title = "Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies",
+
  journal ={Journal of Network Forensics},
+
  volume = {3},
+
  number = {1},
+
  year = {Autumn, 2011},
+
  pages = {19--31}
+
}
+
</bibtex>
+
 
+
<bibtex>
+
@article{ruan,
+
  title="Cloud forensics: An overview",
+
  author={Keyun Ruan and Joe Carthy and Tahar Kechadi and Mark Crosbie},
+
  booktitle={Advances in Digital Forensics VII},
+
  year={2011},
+
  url="http://cloudforensicsresearch.org/publication/Cloud_Forensics_An_Overview_7th_IFIP.pdf"
+
}
+
 
+
</bibtex>
+
<bibtex>
+
 
+
@inproceedings{ruanSurvey,
+
  title="Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis",
+
  author={Keyun Ruan and Ibrahim Baggili and Joe Carthy and Tahar Kechadi},
+
  booktitle={Proceedings of the 2011 ADFSL Conference on Digital Forensics, Security and Law},
+
  year={2011},
+
  organization={ADFSL},
+
  url="http://www.cloudforensicsresearch.org/publication/Survey_on_Cloud_Forensics_and_Critical_Criteria_for_Cloud_Forensic_Capability_6th_ADFSL.pdf"
+
}
+
</bibtex>
+
 
+
<bibtex>
+
@article{CloudForensics,
+
  author = {Mark Taylor and John Haggerty and David Gresty and David Lamb},
+
  title = {Forensic investigation of cloud computing systems},
+
  journal ={Network Security},
+
  volume = {2011},
+
  number = {3},
+
  year = {2011},
+
  pages = {4--10},
+
  url="http://www.whieb.com/download.jsp?address=/upload%2Fdoc%2F20110415%2Fforensic+investigation+of+cloud+computing+systems.pdf"
+
}
+
 
+
</bibtex>
+
<bibtex>
+
 
+
@inproceedings{birk,
+
  title="Technical Issues of Forensic Investigations in Cloud Computing Environments",
+
  booktitle = {Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE)},
+
  author={Dominik Birk and Christoph Wegener},
+
  year={2011},
+
  organization={IEEE},
+
  address = {Oakland, CA, USA},
+
  url="http://code-foundation.de/stuff/2011-birk-cloud-forensics.pdf"
+
}
+
 
+
</bibtex>
+
 
+
<bibtex>
+
@article{Araiza11,
+
  title="Electronic Discovery in the Cloud",
+
  author={Alberto G. Araiza},
+
  journal={Duke Law and Technology Review},
+
  volume = {8},
+
  year = {2011},
+
  url="http://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=1222&context=dltr"
+
}
+
</bibtex>
+
 
+
<bibtex>
+
@article{Cross10,
+
  title="E-Discovery and Cloud Computing:  Control of ESI in the Cloud",
+
  author={David D. Cross and Emily Kuwahara},
+
  journal={EDDE Journal},
+
  volume = {1},
+
  number = {2},
+
  year = {2010},
+
  pages = {2--12},
+
  url="http://www.crowell.com/documents/E-Discovery-and-Cloud-Computing-Control-of-ESI-in-the-Cloud.pdf"
+
}
+
</bibtex>
+
 
+
<bibtex>
+
@book{Lil10,
+
  title="Digital Forensics for Network, Internet and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data",
+
  author={Terrance V. Lillard},
+
  year={2010},
+
  publisher={Syngress},
+
}
+
</bibtex>
+
 
+
<bibtex>
+
@inproceedings{Lu10,
+
  title="Secure provenance: the essential of bread and butter of data forensics in cloud computing",
+
  booktitle={Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10)},
+
  author={Rongxing Lu and Xiaodong Lin and Xiaohui Liang and Xuemin Sherman Shen},
+
  pages={282--292},
+
  year={2010},
+
  address={New York, NY, USA},
+
  organization={ACM},
+
  url="http://bbcr.uwaterloo.ca/~rxlu/paper/asiaccs185-lu.pdf"
+
}
+
 
+
</bibtex>
+
 
+
<bibtex>
+
 
+
@inproceedings{Wol09,
+
  title="Overcast: Forensic Discovery in Cloud Environments",
+
  booktitle = {Proceedings of the 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (IMF '09)},
+
  author={Stephen D. Wolthusen},
+
  pages={3--9},
+
  year={2009},
+
  address={Washington, DC, USA},
+
  organization={IEEE Computer Society}
+
}
+
 
+
</bibtex>
+
 
+
 
+
 
+
[[Category:Bibliographies]]
+

Revision as of 01:14, 9 June 2014

Information icon.png

Please help to improve this article by expanding it.
Further information might be found on the discussion page.

LZ-based

LZNT1

Used in:

LZXPRESS

Used in:

LZXPRESS Huffman

Used in:

External Links

LZ1