Documents
Authors
Tables
Log in
Sign up
MetaCart
DMCA
Donate
Documents:
Advanced Search
Include Citations
Authors:
Advanced Search
Include Citations
Tables:
DMCA
The Advanced Data Acquisition Model . . . (2012)
Cached
Download Links
[researchrepository.murdoch.edu.au]
Save to List
Add to Collection
Correct Errors
Monitor Changes
by Richard Brian Adams
Summary
Citations
Active Bibliography
Co-citation
Clustered Documents
Version History
Citations
2519
The sciences of the artificial
- Simon - 1969
417
Design science in information systems research
- Hevner
142
Using abuse case models for security requirements analysis
- McDermott, Fox - 1999
93
Learning for Action: A Short Definitive Account of Soft Systems Methodology and its Use for Practitioners, Teachers and Students
- Checkland, Poulter - 2006
85
An Examination of Digital Forensic Models
- Reith, Carr, et al. - 2002
73
Computer forensics: Incident Response Essentials
- Kruse, Heiser - 2002
68
Verification and validation of simulation models
- Kleijnen - 1995
64
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers
- Carrier - 2003
56
Digital Evidence and Computer Crime
- Casey - 2004
47
Criminalistics: An Introduction to Forensic Science (10 ed
- Saferstein - 2010
44
Systematic Method for Designers
- Archer - 1984
43
A Hierarchical, Objectives-Based Framework for the
- Beebe, Clark - 2004
40
An Event-Based Digital Forensic Investigation Framework. Paper presented at the Digital Forensics Research Workshop 2004
- Carrier, Spafford - 2004
39
Open source digital forensic tools: the legal argument
- Carrier - 2002
37
Expert knowledge elicitation to improve formal and mental models
- Ford, Sterman - 1998
32
The Enhanced Digital Investigation Process Model. Paper presented at the Digital Forensic Research Workshop
- Baryamureeba, Tushabe - 2004
28
An Extended Model of Cybercrime Investigations
- Ciardhuáin - 2004
27
Guide to Integrating Forensic Techniques into Incident Response
- Kent, Chevalier, et al. - 2006
23
Rigor and Relevance
- Applegate - 1999
20
Cyber Forensics: A Field Manual for Collecting, Examining and Preserving Evidence of Computer Crimes (Second ed
- Marcella, Menendez - 2008
17
The impact of full disk encryption on digital forensics
- Casey, Stellatos - 2008
17
A Comprehensive Approach to digital Incident Investigation
- Stephenson - 2003
16
Questions Arising about Emergence, Data Collection, and Its Interaction with Analysis in a Grounded Theory Study
- Bruce - 2007
15
Computer forensics: The Need for Standardization and Certification
- Meyers, Rogers - 2004
12
Building Theoretical Underpinnings for Digital Forensics Research
- Mocas - 2004
11
A Common Process Model for Incident Response and Computer Forensics. Paper presented at
- Freiling, Schwittay - 2007
10
Guidelines for Evidence Collection and Archiving
- Brezinski, Killalea - 2002
9
Unifying Computer Forensic Modeling Approaches: A Software Engineering Approach. Paper presented at the
- Bogan, Dampier - 2005
7
Electronic Crime Scene Investigation: a guide for first responders. from http://www.ncjrs.gov/pdffiles1/nij/187736.pdf
- Ashcroft - 2001
7
Eliciting Expert Knowledge for Fuzzy Evaluation of Agricultural Production Systems. Rotterdam: Erasmus Research Institute of Management
- Cornelissen, Berg, et al. - 2002
7
Subject Matter Expert (SME)/Peer Use
- Pace, Sheehan - 2002
7
Cyber Criminals on Trial
- Smith, Grabosky, et al. - 2004
6
UML basics: An introduction to the Unified Modeling Language. Retrieved from http://www.ibm.com/developerworks/rational/library/769.html Boddington
- Bell - 2003
6
Digital Evidence: Representation and Assurance
- Schatz - 2007
6
Acquiring volatile operating system data tools and techniques
- Sutherland, Evans, et al. - 2008
5
Electronic Evidence, Document Retention and Privacy Retrieved from http://www.mallesons.com/publications/2006/Mar/ 8367966w.htm
- Argy - 2006
5
Digital evidence: Challenging the Presumption of Reliability
- Buskirk, Liu - 2006
5
ISO/IEC 9126-1:2001, Software engineering -- Product quality -- Part 1: Quality model. www.iso.org: International Organization for Standardization
- ISO - 2001
5
Confluence of Digital Evidence and the Law: On the Forensic Soundness of Live-Remote Digital Evidence Collection
- Kenneally - 2005
5
Two-Dimensional Evidence Reliability Amplification Process Model for Digital Forensics. Paper presented at
- Khatir, Hejazi, et al. - 2008
5
Requirements Engineering: A Roadmap. Paper presented at
- Nuseibeh, Easterbrook - 2000
5
Digital Forensics: Validation and Verification in a Dynamic Work Environment. Paper presented at the
- Slay, Beckett - 2007
5
Digital Footprints: Assessing Computer Evidence
- Sommer - 1998
4
Forensic Computing Theory and Practice: Towards developing a methodology for a standardised approach to computer misuse. Paper presented at the 1st Australian
- Hannan, Frings, et al. - 2003
3
Putting the Science in Digital Forensics
- Cohen - 2011
3
DRAFT - Guidelines for identification, collection, acquisition, and preservation of digital evidence, CD 27037: ISO/IEC
- ISOIEC - 2011
3
Computer Forensics
- Peisert, Bishop, et al. - 2008
3
Formalizing Computer Forensics Process with UML
- Ruan, Huebner - 2009
3
The adaptability of electronic evidence acquisition guides for new technologies. Paper presented at the
- Turnbull - 2008
2
Computer Forensic Procedures and Methods. Retrieved from http://ncfs.org/craiger.forensics.methods.procedures.final.pdf
- Craiger - 2005
2
Contributions to model validation: hierarchy, process, and cessation
- Groesser, Schwaninger - 2012
2
Framework for a Digital Forensic Investigation. Paper presented at the Information Security South Africa Conference 2006 from Insight to Foresight
- Kohn, Eloff, et al. - 2006
2
Gap analysis: Judicial Experience and Perception of Electronic Evidence. Digital Forensic Practice
- Losavio, Adams, et al. - 2006
2
Cybersecurity: the CTOSE project
- Mann - 2004
2
Computer Evidence v. Daubert: The Coming Conflict: Centre for Education and
- Marsico - 2005
2
DCSA: A Practical Approach to Digital Crime Scene Analysis (Fifth ed
- Rogers - 2004
2
New Digital Forensics Investigation Procedure Model. Paper presented at
- Shin - 2008
2
Windows Forensics: The Field Guide for Conducting Corporate Computer Investigations
- Steel - 2006
2
Information Security Handbook
- Tipton, Krause - 2006
2
Advanced Framework for Digital Forensic Technologies and Procedures
- Trcek, Abie, et al. - 2010
2
Formalizing Activity Diagram of UML by Petri Nets
- Trickovic - 2000
2
Process Flows for Cyber Forensics Training and Operations. Retrieved from http:''researchspace.csir.co.za/dspace/bitstream/10204/1073/ 1/Venter_2006.pdf
- Venter - 2006
2
The Best Damn Cybercrime and
- Wiles - 2007
1
The Emergence of Cloud Storage Highlights the Need for a New Digital Forensic
- Adams
1
Evidence and Digital Forensics. Australian Security Magazine August 2012. from http://www.australiansecuritymagazine.com.au
- Adams - 2012
1
Modeling Forensic Evidence Systems Using Design Science. Paper presented at
- Armstrong, Armstrong - 2010
1
Scientific Evidence
- Calhoun - 2008
1
Independent Judicial Research in the Daubert Age
- Cheng - 2007
1
Design Alternatives for the Evaluation
- Cleven, Gubler, et al. - 2009
1
Computer Forensics 101 & Incident Response. Retrieved from httpisacala.orgdoc2003oct1_workshop_pres.pdf Dattu, F
- Cummins, Lowry - 2003
1
Impartiality, efficiency or reliability? A critical response to expert evidence law and procedure
- Edmond - 2010
1
Digital forensics research: The next 10 years. Paper presented at the Digital Forensics Research Workshop 2010
- Garfinkel - 2010
1
Scientific evidence (4
- Giannelli - 2007
1
Guidelines for the Management of IT Evidence. Paper presented at the APEC Telecommunications and Information Working Group
- Gosh
1
HB 231:2004 Information security risk management guidelines: Standards Australia
- Gosh
1
Guidelines for Best Practice in the Forensic Examination of Digital Technology Retrieved from http://www.ioce.org/fileadmin/user_upload/ 2002/Guidelines%20for%20Best%20Practices%20in%20Examination%20of%2 0Digital%20Evid.pdf Ieong
- E - 2002
1
Provided Notes as an Alternative to Juror Notetaking: The Effects of Deliberation
- Kelly - 2010
1
Formal specification: a roadmap. Paper presented at the
- Lamsweerde - 2000
1
Computer Forensics Tool Testing Handbook. Retrieved from http://www.cftt.nist.gov/CFTT-Booklet-Revised-02012012.pdf
- Lyle - 2012
1
30Nov - 2 Dec). A Review of
- McKay, Marshall - 2005
1
What is Forensic Computing? Retrieved from http://www.aic.gov.au/publications/tandi/ti118.pdf
- McKemmish - 1999
1
The Role and Function of the Expert Witness. Retrieved from http://netk.net.au/Reports/ExpertWitness.asp National Centre for Policing Excellence (2005). Practice Advice on Core Investigative Doctrine. Retrieved from http://www.ssiacymru.org.uk/media/pdf/6
- Moles - 2007
1
The Jury Project: Stage 1 - A Survey of Australian and New Zealand Judges
- Ogloff, Clough, et al. - 2006
1
A Road Map for Digital Forensic Research. Retrieved from http://www.dfrws.org/2001/dfrws-rm-final.pdf
- Palmer - 2001
1
Digital Forensic Model Based On
- Perumal - 2009
1
The Good, the Bad and the Unaddressed
- Pollitt - 2009
1
An Ad Hoc Review of Digital Forensic Models". Paper presented at
- Pollitt - 2007
1
Extending Soft Models to Game Design
- Rhalibi, England, et al. - 2005
1
Forensic Computing: A Practitioner's Guide (2nd ed
- Sammes, Jenkinson - 2007
1
Rethinking the Storage of Computer Evidence. Paper presented at the UNAFEI 140th International Training Course: The Criminal Justice Response to Cybercrime
- Schwarz, Newby, et al. - 2009
1
Standards Australia (2012a). About Standards Australia, from http: //www.standards.org.au/OurOrganisation/AboutUs/Pages/default.aspx Standards Australia (2012b). What is a Standard?, from http://www.standards.org.au/ StandardsDevelopment/What_is_a_Standar
- Stanfield - 2009
1
DIPL: The Digital Investigation Process Language. Retrieved from http://people.emich.edu/pstephen/my_presentations/DIPL.ppt Daubert v
- Stephenson - 1993
1
Best Practices for Computer Forensics. from http://www.swgde.org/ documents/swgde2006/Best_Practices_for_Computer_Forensics%20July06.pdf
- SWGDE - 2006
1
Computer Forensics, from http://www.us-cert.gov/reading_room/ forensics.pdf
- US-CERT - 2012