[1]
Federal Bureau of Investigation, Regional Computer Forensics Laboratory (RCFL) Program Annual Report for Fiscal Year 2012, Washington, DC (www. rcf l. gov/downloads/documents/ RCFL_Nat_Annual12. pdf), (2012).
Google Scholar
[2]
K. V. Iserson, and J. C. Moskop, Triage in medicine, part I: concept, history, and types. Annals of emergency medicine, vol. 49(3): 275-281, (2007).
DOI: 10.1016/j.annemergmed.2006.05.019
Google Scholar
[3]
A. Agarwal, M. Gupta, S. Gupta and S. C. Gupta, Systematic digital forensic investigation model, International Journal of Computer Science and Security (IJCSS), vol. 5(1) , pp.118-131, (2011).
Google Scholar
[4]
V. Baryamureeba and F. Tushabe, The enhanced digital investigation process model, Proceedings of the Fourth Digital Forensic Research Workshop, (2004).
Google Scholar
[5]
G. Cantrell and D. Dampier, Evaluation of the semi-automated crime-specific digital triage process model, in Advances in Digital Forensics IX, G. Peterson and S. Shenoii (Eds. ), Springer Berlin Heidelberg, p.410 : 83-98, (2013).
DOI: 10.1007/978-3-642-41148-9_6
Google Scholar
[6]
B. Carrier and E. H. Spafford, Getting physical with the digital investigation process, International Journal of Digital Evidence, vol. 2(2), pp.1-20, (2003).
Google Scholar
[7]
B. Carrier and E. H. Spafford, An event-based digital forensic investigation framework, Proceedings of the Fourth Digital Forensic Research Workshop, (2004).
Google Scholar
[8]
R. F. Erbacher, K. Christensen and A. Sundberg, Visual forensic techniques and processes, Proceedings of the 9th Annual NYS Cyber Security Conference Symposium on Information Assurance, (2006).
Google Scholar
[9]
K. Kent, S. Chevalier, T. Grance, H. Dang, Guide to integrating forensic techniques into incident response, NIST Special Publication, 800-86, (2006).
DOI: 10.6028/nist.sp.800-86
Google Scholar
[10]
G. Palmer, A Road Map for Digital Forensic Research, DFRWS Technical Report, DTR-T001-01 Final, Air Force Research Laboratory, Rome, New York, (2001).
Google Scholar
[11]
M. Pollitt, Computer Forensics: an Approach to Evidence in Cyberspace, Proceedings of the National Information Systems Security Conference, (1995).
Google Scholar
[12]
M. Reith, C. Carr, and G. Gunsch, An Examination of Digital Forensic Models, International Journal of Digital Evidence, vol. 1(3) , pp.1-12, (2002).
Google Scholar
[13]
G. Ruibin, T. Yun and M. Gaertner, Case-relevance information investigation: binding computer intelligence to the current computer forensic framework, International Journal of Digital Evidence, vol. 4(1), pp.1-13, (2005).
Google Scholar
[14]
V. Roussev, C. Quates, and R. Martell, Real-time digital forensics and triage, Digital Investigation, vol. 10(2), pp.158-167, (2013).
DOI: 10.1016/j.diin.2013.02.001
Google Scholar
[15]
M. Rogers, J. Goldman, R. Mislan, T. Wedge, S. Debrota, Computer forensics field triage process model, Journal of the Digital Forensics Security and Law, vol. 1(2), p.27–40, (2006).
DOI: 10.15394/jdfsl.2006.1004
Google Scholar
[16]
D. Brezinski and T. Killalea, RFC 3227: Guidelines for evidence collection and archiving, (http: /www. ietf. org/rfc/rfc3227. txt), (2002).
DOI: 10.17487/rfc3227
Google Scholar
[17]
V. Roussev, and C. Quates, Content triage with similarity digests: the M57 case study, Digital Investigation, vol. 9, pp.60-68, (2012).
DOI: 10.1016/j.diin.2012.05.012
Google Scholar
[18]
A. Shaw, and A. Browne, A practical and robust approach to coping with large volumes of data submitted for digital forensic examination, Digital Investigation, vol. 10(2), pp.116-128, (2013).
DOI: 10.1016/j.diin.2013.04.003
Google Scholar
[19]
K. Nance, B. Hay and M. Bishop, Digital forensics: defining a research agenda, In System Sciences, 2009. HICSS'09. 42nd Hawaii International Conference on (pp.1-6). IEEE.
DOI: 10.1109/hicss.2009.160
Google Scholar
[20]
E. Casey, Digital evidence and computer crime: forensic science, computers and the internet, Academic press, (2011).
Google Scholar
[21]
M. Pollitt, Triage: A practical solution or admission of failure, digital investigation 10(2): 87-88, (2013).
DOI: 10.1016/j.diin.2013.01.002
Google Scholar
[22]
G. Grispos, T. Storer and W. Glisson, Calm before the storm: The challenges of cloud computing in digital forensics, International Journal of Digital Crime and Forensics (IJDCF), vol. 4(2), pp.28-48, (2012).
DOI: 10.4018/jdcf.2012040103
Google Scholar
[23]
ACPO, Good practice guide for computer-based electronic evidence, (2008).
Google Scholar
[24]
J. Nilsson and S. Riedel, Electronic circuits, Prentice Hall, New York, (2008).
Google Scholar