共 12 条
- [1] Bilby D., 2006, P RUXC 2006, P34
- [2] Forensic analysis of the Windows registry in memory [J]. DIGITAL INVESTIGATION, 2008, 5 (S26-S32) : S26 - S32
- [3] The VAD tree: A process-eye view of physical memory [J]. DIGITAL INVESTIGATION, 2007, 4 : S62 - S64
- [4] Duan Y., 2015, 2015 16th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), P1
- [5] Recovery of encryption keys from memory using a linear scan [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1369 - 1376
- [6] Ionescu A, 2009, MICROSOFT WINDOWS IN, P56
- [7] Windows operating systems agnostic memory analysis [J]. DIGITAL INVESTIGATION, 2010, 7 : S48 - S56
- [9] Schuster Andreas., 2006, IMF, P104
- [10] Extracting Windows command line details from physical memory [J]. DIGITAL INVESTIGATION, 2010, 7 : S57 - S63