These are the sources and citations used to research Cyber Investigations. This bibliography was generated on Cite This For Me on
In-text: (Binsalleeh et al., 2010)
Your Bibliography: Binsalleeh, H., Ormerod, T., Boukhtouta, A., Sinha, P., Youssef, A., Debbabi, M. and Wang, L., 2010. On the analysis of the Zeus botnet crimeware toolkit. 2010 Eighth International Conference on Privacy, Security and Trust,.
In-text: (Cichonski, Millar, Grance and Scarfone, 2012)
Your Bibliography: Cichonski, P., Millar, T., Grance, T. and Scarfone, K., 2012. Computer Security Incident Handling Guide : Recommendations of the National Institute of Standards and Technology.
In-text: (Hausknecht, Foit and Buric, 2015)
Your Bibliography: Hausknecht, K., Foit, D. and Buric, J., 2015. RAM data significance in digital forensics. 2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO),.
In-text: (Vidas, 2007)
Your Bibliography: Vidas, T., 2007. The Acquisition and Analysis of Random Access Memory. Journal of Digital Forensic Practice, 1(4), pp.315-323.
10,587 students joined last month!