作者: Juan Carlos Flores Cruz , Travis Atkison
关键词:
摘要: This poster presents a four-phase investigation methodology to acquire, authenticate and analyze virtual machine. During simulated investigation, sensitive information about suspect's activities was obtained from machine by applying the methodology. can be used investigate identify obtain evidence in