Configurable forensic investigative tool

作者: Derek P. Bronner , Julia A. Baker , Matthew P. Donovan , Robert A. Joyce

DOI:

关键词: Common frameworkData scienceEngineeringForensic scienceComputer security

摘要: This disclosure provides example techniques to invoke one or more forensic tools, with a investigative tool. The tool common framework that allows investigators their own trusted tools third-party generated tools. described herein seamlessly and transparently invokes the in accordance an profile created by investigator.

参考文章(28)
Frank N. Adelstein, Derek Bronner, Robert A. Joyce, Judson Powers, Extensible software tool for investigating peer-to-peer usage on a target device ,(2008)
Mark E. Longworth, Todd A. Moore, Brian P. Girardi, Damon S. Love, Apparatus and method for network analysis ,(2002)
Justin Pettit, Vicki Irwin, Craig H. Rowland, Aaron Rhodes, Computer security and management system ,(2002)
Javier Burroni, Gustavo Ajzenman, Gerardo Gabriel Richarte, Bruce Leidl, Ricardo Quesada, Augustin Azubel Friedman, Luciano Notarfrancesco, Maximiliano Gerardo Caceres, Oliver Friedrichs, Gabriel Becedillas, Automated computer system security compromise ,(2002)
Ran Oelgiesser, Ran Kohavi, Yizhak Levy, Seamless integration of multiple computing environments ,(2007)