Forenscope
- 6 December 2010
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
- p. 307-316
- https://doi.org/10.1145/1920261.1920307
Abstract
No abstract availableKeywords
Funding Information
- U.S. Department of Energy (DE-OE0000097)
This publication has 6 references indexed in Scilit:
- Mapping kernel objects to enable systematic integrity checkingPublished by Association for Computing Machinery (ACM) ,2009
- Blurriness in Live Forensics: An IntroductionCommunications in Computer and Information Science, 2009
- BootJackerPublished by Association for Computing Machinery (ACM) ,2008
- Secure and Flexible Monitoring of Virtual MachinesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- The VAD tree: A process-eye view of physical memoryDigital Investigation, 2007
- SubVirt: implementing malware with virtual machinesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006