参考文献
[1] Haggerty J, Karran A, Lamb D. A Framework for the Forensic Investigation of Unstructured Email Relationship Data[J]. International Journal of Digital Crime and Forensics, 2011, 3(3): 1-18.
[2] Lin Hanhe. Predicting Sensitive Relationships from Email Corpus[C]//Proc. of the 4th International Conference on Genetic and Evolutionary Computing. [S. l.]: IEEE Press, 2010: 264-267.
[3] Gupta G, Mazumdar C, Rao M S. Digital Forensic Analysis of E-mails: A Trusted E-mail Protocol[J]. International Journal of Digital Evidence, 2004, 2(4): 1-14.
[4] Iqbal F, Binsalleeh H, Fung B, et al. Mining Write Prints from Anonymous E-mails for Forensic Investigation[J]. Digital Investigation, 2010, 3(2): 1-9.
[5] Banday M T. Analysing E-mail Headers for Forensic Investi- gation[J]. Journal of Digital Forensics, Security and Law, 2011, 6(2): 49-64.
[6] Fellows G H. The Joys of Complexity and the Deleted File[J]. International Journal of Digital Forensics & Incident Response, 2005, 2(2): 89-93.
[7] Carrier B. File System Forensic Analysis[M]. [S. l.]: Addison Wesley, 2005.
[8] Cohen M. Advanced Carving Techniques[J]. International Journal of Digital Forensics & Incident Response, 2007, 4(3/4): 119-128.
[9] Garfinkel S L. Carving Contiguous and Fragmented Files with Fast Object Validation[J]. International Journal of Digital Forensics & Incident Response, 2007, 4(9): 2-12.
[10] Wei Yingjie, Zheng Ning, Xu Ming. An Automatic Carving Method for RAR File Based on Content and Structure[C]// Proc. of the 2nd International Conference on Information Technology and Computer Science. [S. l.]: IEEE Press, 2010: 68-72.
[11] Yoo B, Park J, Lim S, et al. A Study on Multimedia File Carving Method[J]. Multimedia Tools and Applications, 2012, 61(1): 243-261.
[12] Conti G, Bratus S, Shubina A, et al. Automated Mapping of Large Binary Objects Using Primitive Fragment Type Classification[J]. International Journal of Digital Forensics & Incident Response, 2010, 7(8): 3-12.
[13] 张 鹏, 陈 焘, 刘宏伟, 等. 基于身份密码的安全电子邮件系统[J]. 计算机工程, 2009, 35(6): 194-196.
[14] 梁 力, 严建伟, 聂 影. 基于源地址约束的垃圾邮件过滤模型[J]. 西安交通大学学报, 2005, 39(4): 376-379.
[15] Tomar D S, Malviya O, Verma R. Analysis Framework for Quality Measurement of Carving Techniques[C]//Proc. of National Conference on Emerging Trends in Computing and Communication. Hamirpur, India: [s. n.], 2008: 421-426.
[16] Garfinkel S, Paul F, Vassil R, et al. Bringing Science to Digital Forensics with Standardized Forensic Corpora[J]. International Journal of Digital Forensics & Incident Response, 2009, 6(9): 2-11.
编辑 顾逸斐 |