共 15 条
- [1] Kaplan R.E., Computer forensics-what is it good for, Journal of Digital Forensic Practice, 2, 2, pp. 57-61, (2008)
- [2] He X., Wang J., Research on evidence collection under cloud computing environment, Computer Science, 9, pp. 105-108, (2012)
- [3] Zawoad S., Dutta A.K., Hasan R., SecLaaS: secure logging-as-a-service for cloud forensics, Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 219-230, (2013)
- [4] Xie Y., Ding L., Lin Y., Et al., ICFF: a cloud forensics framework under the IaaS model, Journal on Communications, 34, 5, pp. 200-206, (2013)
- [5] Sang T., A log based approach to make digital forensics easier on cloud computing, Intelligent System Design and Engineering Applications (ISDEA), 2013 Third International Conference on, pp. 91-94, (2013)
- [6] Hale J.S., Amazon cloud drive forensic analysis, Digital Investigation, 10, 3, pp. 259-265, (2013)
- [7] Shah J.J., Malik L.G., An approach towards digital forensic framework for cloud, Advance Computing Conference (IACC), 2014 IEEE International, pp. 798-801, (2014)
- [8] Nanda S., Hansen R.A., Forensics as a service: three-tier architecture for cloud based forensic analysis, Parallel and Distributed Computing (ISPDC), 2016 15th International Symposium on, pp. 178-183, (2016)
- [9] Nakamoto S., Bitcoin: a peer-to-peer electronic cash system, Consulted, pp. 1-9, (2009)
- [10] Merkle R.C., A certified digital signature, Conference on the Theory and Application of Cryptology, pp. 218-238, (1989)