These are the sources and citations used to research Digital Forensics Advanced. This bibliography was generated on Cite This For Me on

  • Journal

    Alazab, M., Venkatraman, S. and Watters, P.

    Effective digital forensic analysis of the NTFS disk image

    2009 - Ubiquitous Computing and Communication Journal 4.3 (2009)

    In-text: (Alazab, Venkatraman and Watters, 2009)

    Your Bibliography: Alazab, M., Venkatraman, S. and Watters, P. (2009). Effective digital forensic analysis of the NTFS disk image. Ubiquitous Computing and Communication Journal 4.3 (2009), pp.551-558.

  • Journal

    Broomfield, M.

    NTFS Alternate Data Streams: focused hacking

    2006 - Network Security

    In-text: (Broomfield, 2006)

    Your Bibliography: Broomfield, M. (2006). NTFS Alternate Data Streams: focused hacking. Network Security, 2006(8), pp.7-9.

  • Journal

    Capriotti, J.

    FAT32 vs NTFS

    2000

    In-text: (Capriotti, 2000)

    Your Bibliography: Capriotti, J. (2000). FAT32 vs NTFS. [online] Available at: http://dnl1.tebyan.net/Library/Books/pdf/English/0075f27de8b7d47e87ab6969dac55433.pdf [Accessed 4 Jan. 2018].

  • Website

    MFT Entry Attribute Concepts | NTFS Concepts

    2018

    In-text: (Flylib.com, 2018)

    Your Bibliography: Flylib.com. (2018). MFT Entry Attribute Concepts | NTFS Concepts. [online] Available at: http://flylib.com/books/en/2.48.1/mft_entry_attribute_concepts.html [Accessed 5 Jan. 2018].

  • Journal

    Huebner, E., Bem, D. and Wee, C. K.

    Data hiding in the NTFS file system

    2006 - Digital Investigation

    In-text: (Huebner, Bem and Wee, 2006)

    Your Bibliography: Huebner, E., Bem, D. and Wee, C. (2006). Data hiding in the NTFS file system. Digital Investigation, 3(4), pp.211-226.

  • Journal

    Kim, Y. and Hong, D.

    Windows Registry and Hiding Suspects' Secret in Registry

    2008 - 2008 International Conference on Information Security and Assurance (isa 2008)

    In-text: (Kim and Hong, 2008)

    Your Bibliography: Kim, Y. and Hong, D. (2008). Windows Registry and Hiding Suspects' Secret in Registry. 2008 International Conference on Information Security and Assurance (isa 2008).

  • Journal

    Kwak, J., Kim, H. C., Park, I. H. and Song, Y. H.

    Anti-forensic deletion scheme for flash storage systems

    2016 - 2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)

    In-text: (Kwak et al., 2016)

    Your Bibliography: Kwak, J., Kim, H., Park, I. and Song, Y. (2016). Anti-forensic deletion scheme for flash storage systems. 2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC).

  • Website

    Master File Table (Windows)

    2018

    In-text: (Msdn.microsoft.com, 2018)

    Your Bibliography: Msdn.microsoft.com. (2018). Master File Table (Windows). [online] Available at: https://msdn.microsoft.com/en-us/library/windows/desktop/aa365230(v=vs.85).aspx [Accessed 2 Jan. 2018].

  • Website

    Master File Table (Windows)

    2018

    In-text: (Msdn.microsoft.com, 2018)

    Your Bibliography: Msdn.microsoft.com. (2018). Master File Table (Windows). [online] Available at: https://msdn.microsoft.com/en-us/library/bb470206(v=vs.85).aspx [Accessed 4 Jan. 2018].

  • Website

    Predefined Keys (Windows)

    2018

    In-text: (Msdn.microsoft.com, 2018)

    Your Bibliography: Msdn.microsoft.com. (2018). Predefined Keys (Windows). [online] Available at: https://msdn.microsoft.com/en-us/library/windows/desktop/ms724836(v=vs.85).aspx [Accessed 6 Jan. 2018].

  • Website

    Registry Value Types (Windows)

    2018

    In-text: (Msdn.microsoft.com, 2018)

    Your Bibliography: Msdn.microsoft.com. (2018). Registry Value Types (Windows). [online] Available at: https://msdn.microsoft.com/en-us/library/windows/desktop/ms724884(v=vs.85).aspx [Accessed 6 Jan. 2018].

  • Website

    Structure of the Registry (Windows)

    2018

    In-text: (Msdn.microsoft.com, 2018)

    Your Bibliography: Msdn.microsoft.com. (2018). Structure of the Registry (Windows). [online] Available at: https://msdn.microsoft.com/en-us/library/windows/desktop/ms724946(v=vs.85).aspx [Accessed 6 Jan. 2018].

  • Journal

    Nabity, P. and Landry, B.

    Recovering Deleted and Wiped Files: A Digital Forensic Comparison of FAT32 and NTFS File Systems using Evidence Eliminator

    2018

    In-text: (Nabity and Landry, 2018)

    Your Bibliography: Nabity, P. and Landry, B. (2018). Recovering Deleted and Wiped Files: A Digital Forensic Comparison of FAT32 and NTFS File Systems using Evidence Eliminator. [online] pp.4-5. Available at: http://www.swdsi.org/swdsi2010/sw2010_preceedings/papers/pa121.pdf [Accessed 4 Jan. 2018].

  • Book

    Nelson, B. and Phillips, A.

    Guide to computer forensics and investigations

    In-text: (Nelson and Phillips, n.d.)

    Your Bibliography: Nelson, B. and Phillips, A. (n.d.). Guide to computer forensics and investigations. p.222.

  • Book

    Nelson, B., Steuart, C. and Phillips, A.

    Guide to computer forensics and investigations

    In-text: (Nelson, Steuart and Phillips, n.d.)

    Your Bibliography: Nelson, B., Steuart, C. and Phillips, A. (n.d.). Guide to computer forensics and investigations. pp.194-195.

  • Book

    Nelson, B., Steuart, C. and Phillips, A.

    Guide to computer forensics and investigations

    In-text: (Nelson, Steuart and Phillips, n.d.)

    Your Bibliography: Nelson, B., Steuart, C. and Phillips, A. (n.d.). Guide to computer forensics and investigations. pp.220-221.

  • Book

    Nelson, B., Steuart, C. and Phillips, A.

    Guide to computer forensics and investigations

    In-text: (Nelson, Steuart and Phillips, n.d.)

    Your Bibliography: Nelson, B., Steuart, C. and Phillips, A. (n.d.). Guide to computer forensics and investigations. p.623.

  • Book

    Nelson, B., Steuart, C. and Phillips, A.

    Guide to computer forensics and investigations

    In-text: (Nelson, Steuart and Phillips, n.d.)

    Your Bibliography: Nelson, B., Steuart, C. and Phillips, A. (n.d.). Guide to computer forensics and investigations. p.628.

  • Website

    NTFS Master File Table (MFT)

    2018

    In-text: (Ntfs.com, 2018)

    Your Bibliography: Ntfs.com. (2018). NTFS Master File Table (MFT). [online] Available at: http://ntfs.com/ntfs-mft.htm [Accessed 5 Jan. 2018].

  • Journal

    Srinivasan, A., Nazaraj, S. T. and Stavrou, A.

    HIDEINSIDE — A novel randomized & encrypted antiforensic information hiding

    2013 - 2013 International Conference on Computing, Networking and Communications (ICNC)

    In-text: (Srinivasan, Nazaraj and Stavrou, 2013)

    Your Bibliography: Srinivasan, A., Nazaraj, S. and Stavrou, A. (2013). HIDEINSIDE — A novel randomized & encrypted antiforensic information hiding. 2013 International Conference on Computing, Networking and Communications (ICNC).

  • Website

    Anon

    2018

    In-text: (Support.microsoft.com, 2018)

    Your Bibliography: Support.microsoft.com. (2018). [online] Available at: https://support.microsoft.com/en-us/help/140365/default-cluster-size-for-ntfs--fat--and-exfat [Accessed 4 Jan. 2018].

  • Website

    How NTFS Works: Local File Systems

    2018

    In-text: (Technet.microsoft.com, 2018)

    Your Bibliography: Technet.microsoft.com. (2018). How NTFS Works: Local File Systems. [online] Available at: https://technet.microsoft.com/en-us/library/cc781134(v=ws.10).aspx [Accessed 4 Jan. 2018].

  • Website

    How NTFS Works: Local File Systems

    2018

    In-text: (Technet.microsoft.com, 2018)

    Your Bibliography: Technet.microsoft.com. (2018). How NTFS Works: Local File Systems. [online] Available at: https://technet.microsoft.com/en-us/library/cc781134(v=ws.10).aspx [Accessed 5 Jan. 2018].

  • Website

    What Is NTFS?: Local File Systems

    2018

    In-text: (Technet.microsoft.com, 2018)

    Your Bibliography: Technet.microsoft.com. (2018). What Is NTFS?: Local File Systems. [online] Available at: https://technet.microsoft.com/en-us/library/cc778410(v=ws.10).aspx [Accessed 4 Jan. 2018].

  • Website

    Verduzco, W.

    Tweak Your Lumia WP8 Device with Lumia Registry Modifier

    2018

    In-text: (Verduzco, 2018)

    Your Bibliography: Verduzco, W. (2018). Tweak Your Lumia WP8 Device with Lumia Registry Modifier. [online] xda-developers. Available at: https://www.xda-developers.com/tweak-your-lumia-wp8-device-with-lumia-registry-modifier/ [Accessed 6 Jan. 2018].

  • Journal

    Wee, C. K.

    Analysis of hidden data in NTFS file system

    2006 - Edith Cowan University

    In-text: (Wee, 2006)

    Your Bibliography: Wee, C. (2006). Analysis of hidden data in NTFS file system. Edith Cowan University.

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Super fast and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use our extensive Premium features (Plagiarism checks, Word Add On...)
  • ✔ Create and edit multiple bibliographies
Join