DIGITAL FORENSIC INVESTIGATION – METHOD FOR IDENTIFICATION AND ANALYSIS OF MALICIOUS SOFTWARE ON LINUX SYSTEM Page 45 of 81
Ahmad Zaid Zam Zami REFERENCES
Active Undelete. (n.d.). Hard Disk Drive Basics. Retriefed from http://www.active- undelete.com/hdd_basic.htm
Bem. D, Huebner, E. (2007). Computer Forensic in A Virtual Environtment.
International Journal of Digital Evidence, 6(2)
Carrier, B., & Spafford, EH. (2003). Getting physical with the digital investigation process. International Journal of Digital Evidence (IJDE), 2(2)
Carrier, B., & Spafford, EH. (2004). An event-based digital forensic investigation framework. DFRWS 2004.
Carrier, B., & Spafford, EH. (2004). Defining event reconstruction of a digital crime scene. Journal of Forensic Sciences.
Carrier, B. (2005). PC Based Partition. Retriefed from http://www.aw- bc.com/samplechapter/0321268172.pdf
Garfinkel, S. (2005). The Advanced Forensic Format 1.0. Retrieved November 13, 2006 from http://www.afflib.org/affdoc.pdf
Hart, S. V. (April 2004). Forensic Examination of Digital Evidence: A Guide for Law Enforcement. from http://www.ojp.usdoj.gov/nij/pubs-sum/199408.htm
Hosmer, C. (2002). Proving the Integrity of Digital Evidence with Time. International Journal of Digital Evidence, 1(1)
Kaur. R, Kaur. A, (2012). Digital Forensics. International Journal of Computer Applications, 50(5)
Kruse II, W. G., & Heiser, J. G. (2002). Computer Forensics: Incident Response Essentials (1st ed.): Addison Wesley Professional.
McKemmish, R. (1999). What is Forensic Computing? : Australian Institute of Criminology.
Yusoff, Y., Ismail, R., & Hassan, Z. (2011). Common Phases of Computer Forensics Investigation Models. International Journal of Computer Science & Information Technology.