共 293 条
[1]
Abad Jorge Benitez, 2018, COMPUTER FORENSICS A
[2]
Adedayo OM, 2016, 2016 IEEE INTERNATIONAL CONFERENCE ON CYBERCRIME AND COMPUTER FORENSIC (ICCCF)
[3]
Afifah Khoirunnisa, 2016, DATA SOFTWARE ENG IC, P1
[4]
Agrawal R., 2004, P ACM SIGMOD INT C M, P563
[5]
Al Awawdeh Shadi, 2013, SYSTEMATIC APPROACHE, P1, DOI [10.1109/SADFE.2013.6911539, DOI 10.1109/SADFE.2013.6911539]
[6]
Al-Hadadi Mubarak, 2013, International Journal of Computer and Electrical Engineering, V5, P576, DOI 10.7763/IJCEE.2013.V5.776
[7]
Al-Saleh Mohammed, 2013, 2 INT C CYBER SECURI, P189
[8]
Live forensics of software attacks on cyber-physical systems
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2020, 108
:1217-1229
[9]
Albano P., 2011, 2011 International Conference on Broadband, Wireless Computing, Communication and Applications, P380, DOI 10.1109/BWCCA.2011.62
[10]
Alenezi Ahmed, IOT FORENSICS STATE