:::

詳目顯示

回上一頁
題名:應用於新興資通犯罪偵查與鑑識之 研究
作者:鄧思源
作者(外文):TENG, SZU-YUAN
校院名稱:中央警察大學
系所名稱:鑑識科學研究所
指導教授:温哲彥
學位類別:博士
出版日期:2021
主題關鍵詞:數位鑑識虛擬行動裝置雲端服務網路犯罪Digital forensicsVirtual mobile deviceCloud serviceCybercrime
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:1
在鑑識科學的領域中,數位鑑識是物理鑑識領域中的一個新分支,隨著資訊科技與數位裝置的廣泛應用,益發突顯數位鑑識的重要性。而與數位鑑識息息相關之數位證據種類及態樣與日俱增,使得犯罪調查與數位鑑識人員的工作日益繁重與困難。個人在偵辦新興資通犯罪有關的案件時,常遭遇許多新型態數位證據的鑑識問題,然而可供直接參考應用的資料卻非常少,此外,對於此類過往未曾接觸或研究過之數位證據要如何下手取證及分析,也往往無應對之鑑識方法,因此,個人就將這些實務經驗轉換成本論文之研究動機。而本論文之目的則在探討數種在資通犯罪偵查與鑑識工作實務上較易接觸且複雜度較高之新興資通犯罪案件,並提出相對應之鑑識框架、數位跡證資料處理的方法,以及鑑識特徵擷取的方式,希望藉以解決前述新型態數位證據鑑識之相關問題,並提供給資通犯罪偵查與數位鑑識實務工作者參考與應用。本論文探討之數位鑑識範圍主要包括以下4個部分:虛擬行動裝置、跨平台或反鑑識特性應用程式、非主流雲端服務,以及軟體偽變造。
近年來,隨著跨境犯罪活動的迅速發展,駭客及網路犯罪份子不斷地跳出現有思維框架的限制,他們往往會發現系統中最薄弱之環節和可攻擊點,加以利用並造成公眾、企業和政府組織的損害與資安威脅。針對此問題,本論文另外一個研究的主題即是提出以結合數位鑑識工具及開源情報工具(OSINT)之解決方案,並整合在一個即時犯罪偵測與調查平台中,希望有效預防與快速地打擊不斷上升的跨境網路犯罪,相關技術亦可提供執法人員參考運用。
衷心期盼本論文之研究結果能對我國執法機關之犯罪偵查與數位鑑識工作有所貢獻。
Digital forensics is a new branch of physical forensics. With the widespread applications of information technologies and digital devices, the importance of digital forensics has become more prominent. Since the types and styles of digital evidence are various and fast-changing, it is a big challenge for digital forensic practitioners to deal with. The purpose of this dissertation is to provide the forensic framework and to show related forensic characteristics of such new types of digital evidence.
The scope of the new digital evidence discussed in this dissertation includes four types: virtual mobile devices, cross-platform and anti-forensic applications, non-mainstream cloud services, and multimedia files. In addition, with the rapid development of criminal motives and activities of cross-border hackers, cybercriminals continue to jump beyond the limits of their thinking framework and find ways to harm and threaten the public, enterprises and government organizations. In order to solve these problems, we combine some tools to provide a real-time crime detection and investigation platform for law enforcement officers, such as social media analysis, digital forensic tools, open source intelligence tools (OSINT). The experimental results show that our work can assist criminal investigations.
1.Forensic Science Medical Definition, 2020 2 Sep, Available from: https://www.merriam-webster.com/medical/forensic%20science.
2.李紹豪、孟憲輝. 台美英澳四國鑑識科學教育課程之比較研究. 教育資料集刊 2009; 第44輯:79-112.
3.温哲彥. 數位科技發展對於鑑識科學的影響與挑戰. 明辨雜誌 2019, 4-15.
4.DFRWS A. Road Map for Digital Forensic Research. Report from the 1st Digital Forensic Research Workshop (DFRWS), 16.
5.What is Digital Forensics _ Phases of Digital Forensics, 2020 11 Nov, Available from: https://www.eccouncil.org/what-is-digital-forensics/.
6.Digital forensics_ 4.3 Different types of digital forensics, 2020 10 Sep, Available from: https://www.open.edu/openlearn/science-maths-technology/digital-forensics/content-section-4.3.
7.吳典松. 數位證據保全標準作業程序及第一線人員使用工具之簡介. 國家發展委員會: 中華民國 104 年 6 月; Vol. 政府機關資訊通報第332期(6月).
8.Schofield D, Mason SJM, S., Lexis-Nexis. Using Graphical Technology to Present Evidence, Chapter 5, Electronic Evidence, ed. 2010.
9.Statistics, 2020 25 Aug, Available from: https://www.itu.int/en/ITU-D/Statistics/Pages/stat/default.aspx.
10.Operating System Market Share Worldwide, 2020 25 Aug, Available from: https://gs.statcounter.com/os-market-share.
11.Virtualization vs. Emulation vs. Simulation_ What's the Difference, 2020 25 Oct, Available from: https://www3.technologyevaluation.com/sd/category/virtualization-virtual-machine/articles/virtualization-vs-emulation-vs-simulation.
12.Android Architecture, 2020 10 Oct, Available from: https://source.android.com/devices/architecture?hl=en.
13.Difference Between Emulator vs Simulator For Mobile Testing | LambdaTest, 2020 18 Feb, Available from: https://sarahelson81.medium.com/difference-between-emulator-vs-simulator-for-mobile-testing-lambdatest-1bafd83fdd85.
14.鄧思源、林育梨. 運用ANDROID仿真器做為數位犯罪工具之研究. 資訊安全通訊 2016; 22卷:49-70. doi: 10.29614.
15.鄧思源、劉秉昕、林育梨. 常見Android仿真器及反鑑識隱藏訊息應用程式的研究. 2016年犯罪偵查與鑑識科學國際研討會, 179-184, 中央警察大學.
16.The best secure browsers of 2017, 2017 30 Jun, Available from: http://www.techworld.com/security/best-8-secure-browsers-3246550/.
17.鄧思源. 匿名瀏覽器使用者活動的鑑識研究. 2017年犯罪偵查與鑑識科學研討會, 267-272, 中央警察大學.
18.Edmond Locard – The Forensics Library, 2019 15 June, Available from: http://aboutforensics.co.uk/edmond-locard/.
19.Zatyko K, Bay JJFM. The digital forensics cyber exchange principle. 2011:13-15.
20.鄧思源. 常見跨平台P2P零流量檔案傳輸應用程式的研究. 2019年犯罪偵查與鑑識科學研討會, 243-249, 中央警察大學.
21.鄧思源、温哲彥. 常見跨平台遊戲語音聊天軟體應用在網路犯罪鑑識的研究. TANET 2020 臺灣網際網路研討會, 1342-1347, 國立臺灣大學.
22.Chat for Communities and Friends, 2020 25 July, Available from: https://discord.com/new.
23.Discord Users Be Careful Of Malware And Information Theft, 2020 25 July, Available from: https://www.c2csi.com/2019/11/11/discord-users-be-careful-of-malware-and-information-theft/.
24.Discord: The $2 Billion Gamer's Paradise Coming To Terms With Data Thieves, Child Groomers And FBI Investigators, 2020 25 July, Available from: https://www.forbes.com/sites/thomasbrewster/2019/01/29/discord-the-2-billion-gamers-paradise-coming-to-terms-with-data-thieves-child-groomers-and-fbi-investigators/#583fc7bf3741.
25.Mell P, Grance T. The NIST definition of cloud computing. 2011.
26.Group NCCFSW. Nist cloud computing forensic science challenges; National Institute of Standards and Technology: 2014.
27.Mapping ISO27037 to Cloud Computing Environments, 2017 15 June, Available from: https://downloads.cloudsecurityalliance.org/initiatives/imf/Mapping-the-Forensic-Standard-ISO-IEC-27037-to-Cloud-Computing.pdf.
28.鄧思源、陳受湛、劉秉昕. 應用程式雲客戶端資料之鑑識. 資訊安全通訊 2017; 23卷:19 - 36. doi: 10.29614.
29.Personal cloud, 2020 15 Nov, Available from: https://en.wikipedia.org/wiki/Personal_cloud.
30.鄧思源. Android行動裝置之個人雲的研究. 2018年犯罪偵查與鑑識科學研討會, 231-236, 中央警察大學.
31.【iThome 2015年CIO大調查(中)】雲端採用趨勢分析, 2015 25 May, Available from: https://www.ithome.com.tw/article/94084.
32.鄧思源、劉秉新. vSphere為基礎之私有雲及數種個人雲鑑識之初探. 2015年犯罪偵查與鑑識科學研討會, 107-112, 中央警察大學.
33.鄧思源. Skype即時通訊軟體對話記錄偽變分析與刪除記錄鑑識的研究. 第二十二屆資訊安全會議(The 22nd Cryptology and Information Security Conference(CISC 2012)), 63, 中興大學.
34.Teng S-Y, Lin Y-L. Skype Chat Data Forgery Detection. International Conference on Future Generation Communication and Networking, 108-114.
35.鄧思源、林育梨. 常見即時通訊軟體對話記錄偽變分析的研究. 2012年鑑識科學研討會, 199-204, 中央警察大學.
36.鄧思源、錢世傑、林育梨. Adobe PDF文件檔元資料的追蹤與竄改偽變鑑識的研究. 2012年數位鑑識與科技偵查研討會, 1-9, 中央警察大學, 2012/11/15.
37.鄧思源. 以3GP/MP4多媒體視訊檔內嵌元資料鑑別視訊檔案來源之研究. 明辨(FACT) 2014; 6:38-59.
38.鄧思源、林育梨. 行動裝置視訊檔數位音訊資料真偽鑑識的研究. 第二十四屆全國資訊安全會議(Cryptology and Information Security Conference 2014), 179, 政治大學.
39.NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2006, 2019 15 May, Available from: https://www.congress.gov/109/plaws/publ163/PLAW-109publ163.pdf.
40.鄧思源、葉琨煒. 整合及應用物聯網搜尋引擎打擊和預防跨境網路犯罪實證之研究. 2019年第14屆海峽兩岸暨香港、澳門警學研討會, 中國瀋陽市.
41.Al-Saleh MI, Forihat YAJIJoCA. Skype forensics in android devices. 2013; 78(7).
42.Sara T, Vance C, Fenger T, Brunty J, Price J. Forensic Analysis of Dropbox Application File Artifacts Recovered on Android and iOS Mobile Devices. 2013.
43.Mehrotra P, Pradhan T, Jain PJIJoI, Technology C. Instant Messaging Service on Android Smartphones and Personal Computers. 2014; 4(3):265-272.
44.Al-Hadadi M, AlShidhani AJIJoC, Engineering E. Smartphone forensics analysis: A case study. 2013; 5(6):576.
45.Andriotis P, Oikonomou G, Tryfonas T. Forensic analysis of wireless networking evidence of android smartphones. 2012 IEEE International Workshop on Information Forensics and Security (WIFS), 109-114.
46.Busstra B, Le-Khac N-A, Kechadi M-T. Android and Wireless data-extraction using Wi-Fi. Fourth edition of the International Conference on the Innovative Computing Technology (INTECH 2014), 170-175.
47.Mazurczyk W, Caviglione LJICS, Tutorials. Steganography in modern smartphones and mitigation techniques. 2014; 17(1):334-357.
48.Chowdary DP, Liu QJS. Exploring Covert Communication in Text Message on Android Smartphones. 32:36.
49.Ghare R, Bansode P, Bombale S, Chandargi B. LSB Steganography Using Android Phone. International Journal of Computer Science Information Technologies 2015; 6(2):1027-1029.
50.Anglano C, Canonico M, Guazzone MJDi. Forensic analysis of the chatsecure instant messaging application on android smartphones. 2016; 19:44-59.
51.Mehrotra T, Mehtre B. Forensic analysis of Wickr application on android devices. 2013 IEEE International Conference on Computational Intelligence and Computing Research, 1-6.
52.Aggarwal G, Bursztein E, Jackson C, Boneh D. An Analysis of Private Browsing Modes in Modern Browsers. USENIX security symposium, 79-94.
53.Mahendrakar A, Irving J, Patel S. Forensic analysis of private browsing mode in popular browsers. Carnegie Mellon University, nd Web: 2012.
54.Said H, Al Mutawa N, Al Awadhi I, Guimaraes M. Forensic analysis of private browsing artifacts. 2011 International Conference on Innovations in Information Technology, 197-202.
55.Ohana D, Shashidhar N. Do Private and Portable Web Browsers Leave Incriminating Evidence? Proceedings of the International Workshop on Cyber Crime, San Francisco, CA.
56.Ghafarian A, Seno SAH. Analysis of privacy of private browsing mode through memory forensics. International Journal of Computer Applications 2015; 132(16).
57.Flowers C, Mansour A, Al-Khateeb HMJIJoES, Forensics D. Web browser artefacts in private and portable modes: a forensic investigation. 2016; 8(2):99-117.
58.Shafqat NJIIJCSNS. Forensic investigation of user’s web activity on Google Chrome using various forensic tools. 2016; 16(9):123-132.
59.Warren C, El-Sheikh E, Le-Khac N-A. Privacy preserving Internet browsers: Forensic analysis of Browzar. In Computer and network security essentials, Springer: 2018; 369-388.
60.Sweetu Faldu DC. Comparitive analysis SHAREit vs Xender vs Zapya. International Journal of Advance Research in Engineering, Science & Technology 2016.
61.Khandelwal S, Sailor IR, Mistry N, Dahiya MS. An Insight into File Sharing Artifacts Using Xender Application. 2016 8th International Conference on Computational Intelligence and Communication Networks (CICN), 386-389.
62.Comparative Study of Airdrop Vs SHAREit WiFi Direct File Transfer Using Compatible Devices, 2020 16 Aug, Available from: https://uphsl.edu.ph/research/COMPUTER STUDIES/OROZCO, Michael M/Comparative Study of Airdrop Vs SHAREit WiFi Direct File Transfer.pdf.
63.Turnbull B, Slay J. Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics. 2008 Third International Conference on Availability, Reliability and Security, 1355-1360.
64.Chu H-C, Deng D-J. Potential cyberterrorism via a multimedia smart phone based on a web 2.0 application via ubiquitous Wi-Fi access points and the corresponding digital forensics. Multimedia Systems 2011; 17:341-349. doi: 10.1007/s00530-010-0216-7.
65.Liu K, Shen W, Cheng Y, Cai LX, Li Q, Zhou S, Niu ZJIIoTJ. Security analysis of mobile device-to-device network applications. 2018; 6(2):2922-2932.
66.Why is my secret leaked? Discovering vulnerabilities in device-to-device file sharing, 2020 16 Aug, Available from: https://arxiv.org/pdf/2002.03144.pdf.
67.Shin S, Park E, Kim S, Kim J. Artifacts Analysis of Slack and Discord Messenger in Digital Forensic. Digital Contents Society Journal 2020; 21(4):799-809.
68.Tabuyo-Benito R, Bahsi H, Peris-Lopez P. Forensics Analysis of an On-line Game over Steam Platform. International Conference on Digital Forensics and Cyber Crime, 106-127.
69.Milagre J, Caiado M. Cloud Computing Forensics. Best Practice and Challenges for Process Efficiency of Investigations and Digital Forensics. Proceedings of The Eighth International Conference on Forensic Computer Science, 18-26.
70.Birk D, Wegener C. Technical issues of forensic investigations in cloud computing environments. 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 1-10.
71.Damshenas M, Dehghantanha A, Mahmoud R, bin Shamsuddin S. Forensics investigation challenges in cloud computing environments. Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 190-194.
72.Quick D, Choo K-KRJJoN, Applications C. Google Drive: Forensic analysis of data remnants. 2014; 40:179-193.
73.Amirullah A, Riadi I, Luthfi AJIJoCA. Forensics analysis from cloud storage client application on proprietary operating system. 2016; 143(1):1-7.
74.Dykstra J, Riehl DJRJ, Tech. Forensic collection of electronic evidence from infrastructure-as-a-service cloud computing. 2012; 19:1.
75.田慶宜、黃道麗. Vsphere 架構私有雲取證方法研究及其實踐. 第 26 次全國電腦安全學術交流會, 44-46.
76.Leung C-M, Chan Y-Y. Network forensic on encrypted peer-to-peer voip traffics and the detection, blocking, and prioritization of skype traffics. 16th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2007), 401-408.
77.Dodge RC. Skype fingerprint. Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), 484.
78.Simon M, Slay J. Recovery of skype application activity data from physical memory. 2010 International Conference on Availability, Reliability and Security, 283-288.
79.Salama U, Varadharajan V, Hitchens M. Metadata based forensic analysis of digital information in the web. Annual Symposium of Information Assurance and Secure Knowledge Management, Albany, NY, 9-15.
80.Nelson S, Simek JJLP. Metadata: What You Can't See Can Hurt You. 2006; 32:28.
81.Giova G. Improving chain of custody in forensic investigation of electronic digital systems. International Journal of Computer ScienceNetwork Security 2011; 11(1):1-9.
82.Tiwari RK, Sahoo GJISJAGP. A novel methodology for data hiding in PDF files. 2011; 20(1):45-57.
83.Koenig BE, Lacey DSJJotAES. Forensic authentication of digital audio recordings. 2009; 57(9):662-695.
84.Grigoras C. Applications of ENF analysis method in forensic authentication of digital audio and video recordings. Audio Engineering Society Convention 123.
85.Cooper AJ. Detection of copies of digital audio recordings produced using analogue interfacing. International Journal of Speech, Languagethe Law 2008; 15(1).
86.Koenig BE, Lacey DSJJofs. An inconclusive digital audio authenticity examination: a unique case. 2012; 57(1):239-245.
87.Koenig BE, Lacey DSJJotAES. Forensic authenticity analyses of the header data in re-encoded WMA files from small Olympus audio recorders. 2012; 60(4):255-265.
88.Guo H, Zhang Y. Research on Digital Audio Authenticity Analysis. Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering.
89.Rappaport DL. Establishing a standard for digital audio authenticity: A critical analysis of tools, methodologies, and challenges: Citeseer; 2012.
90.Pastor-Galindo J, Nespoli P, Mármol FG, Pérez GMJIA. The not yet exploited goldmine of OSINT: Opportunities, open challenges and future trends. 2020; 8:10282-10304.
91.Quick D, Choo K-KRJFGCS. Digital forensic intelligence: Data subsets and Open Source Intelligence (DFINT+ OSINT): A timely and cohesive mix. 2018; 78:558-567.
92.Kao D-Y, Chao Y-T, Tsai F, Huang C-Y. Digital evidence analytics applied in cybercrime investigations. 2018 IEEE Conference on Application, Information and Network Security (AINS), 111-116.
93.Lee S, Shon T. Open source intelligence base cyber threat inspection framework for critical infrastructures. 2016 Future Technologies Conference (FTC), 1030-1033.
94.Run Android on Windows - Fastest Android Emulator, Available from: http://www.amiduos.com/.
95.The Best Android Emulator For PC & Mac _ Andy Android Emulator, 2016 15 May, Available from: http://www.andyroid.net/.
96.Bluestacks Android Emulator for PC and Mac, 2016 15 May, Available from: http://www.bluestacks.com/about-us/app-player.html.
97.droid4x simulator-best mobile experience on desktop, 2016 15 May, Available from: http://www.droid4x.com/.
98.Fast And Easy Android Emulation, 2016 15 May, Available from: https://www.genymotion.com/.
99.The Best Free Android Emulator for PC - KOPLAYER, 2016 15 May, Available from: http://www.koplayer.com/.
100.MEmu - Android emulator for PC, better than Bluestacks, 2016 15 May, Available from: http://www.memuplay.com/.
101.Nox App Player Download for Windows PC, Mac, Laptop, 2016 15 May, Available from: http://noxappplayer.com/.
102.Windroy download, 2019 5 June, Available from: https://sourceforge.net/projects/windroy/.
103.Simulate Android apps with the Xamarin Android Player - Xamarin, 2016 15 May, Available from: https://www.xamarin.com/android-player.
104.YouWave, A world for Android on PC, 2016 15 May, Available from: https://youwave.com/.
105.Curran K, Robinson A, Peacocke S, Cassidy S. Mobile phone forensic analysis. In Crime Prevention Technologies and Applications for Advancing Criminal Investigation, IGI Global: 2012; pp. 250-262.
106.Barrett D, Kipper GJS, Boston. Investigating Dead Virtual Environments, Virtualization and Forensics. 2010:83-107.
107.Virtual forensics Investigating virtual environments, 2014 8 Aug, Available from: https://media.blackhat.com/bh-eu-10/presentations/Beek/Blackhat-EU-2010-Beek-Virtual-Forensics-slides.pdf.
108.Bem D, Huebner E. Computer forensic analysis in a virtual environment. International journal of digital evidence 2007; 6(2):1-13.
109.The Best iOS and iPad simulator, 2020 31 Oct, Available from: https://ipadian.net/.
110.鄧思源. 虛擬行動裝置平台及其即時通訊軟體的調查與鑑識. 2014年鑑識科學研討會, 199-204, 中央警察大學.
111.Epic Privacy Browser, a secure chromium-based web browser that protects your privacy and browsing history _ a free VPN privacy browser, 2017 1 June, Available from: https://www.epicbrowser.com/.
112.Secure Browser Fast, Secure, Private Web Browser, 2017 15 June, Available from: https://www.securebrowser.com/.
113.Secure Web Browser Fastest Free Dragon Browser from Comodo, 2017 15 June, Available from: https://www.comodo.com/home/browsers-toolbars/browser.php.
114.SRWare Iron The Browser of the Future, 2017 15 June, Available from: https://www.srware.net/en/software_srware_iron.php.
115.Dooble Web Browser, 2017 15 June, Available from: http://dooble.sourceforge.net/.
116.傲游5 全新發佈 支持全平臺免費下載, 2017 15 May, Available from: http://www.maxthon.cn/.
117.Zapya – Help, 2020 16 Aug, Available from: https://www.izapya.com/v3/help.
118.Download SHAREit App for Android, PC and iOS, 2020 16 Aug, Available from: https://share it.one.
119.The mobile file transfer and sharing app, 2020 16 Aug, Available from: http://www.xender.com/index.html.
120.Share files offline, 2020 16 Aug, Available from: https://feem.io/index.html.
121.Discord-Chat for Communities and Friends, 2020 25 July, Available from: https://discord.com/new.
122.About Mumble, 2020 26 July, Available from: https://www.mumble.info/.
123.Welcome to Element!, 2020 26 July, Available from: https://element.io/blog/welcome-to-element/.
124.Steam Now Has One Billion Accounts (And 90 Million Active Users), 2020 26 July, Available from: https:/variety.com/2019/gaming/news/steam-one-billion-accounts-1203201159/.
125.WHAT MAKES TEAMSPEAK THE NUMBER 1 CHOICE FOR PRO GAMERS, 2020 26 July, Available from: https:\\www.teamspeak.com\en\features\overview\.
126.General - FAQs – Overtone, 2020 26 July, Available from: https://overtone.app/gamers/help/12.
127.Teng SY, Wen CY. A forensic examination of four popular cross-platform file-sharing apps with Wi-Fi P2P. Journal of Forensic Sciences 2021; 66(1):p315-322. doi: 10.1111/1556-4029.14574.
128.Application Virtualization _ Windows Apps in the Browser, 2020 20 Oct, Available from: https://cameyo.com/.
129.Run Desktop Applications Online, 2020 20 Oct, Available from: https://www.rollapp.com/.
130.Turbo and Docker, 2020 20 Oct, Available from: https://turbo.net/docs/about/turbo-and-docker.
131.Run Your Personal Cloud. A Free Private Cloud Server, 2018 12 July, Available from: https:// https://www.tonido.com/.
132.Remote Access To Your PC, 2018 12 July, Available from: https://orbweb.me/.
133.File Security Made Simple _ pCloud, 2020 12 July, Available from: https://www.pcloud.com/zh/.
134.Connecting Massive Data Flows, 2020 8 Oct, Available from: https://www.resilio.com/.
135.Open Source File Sync and Share Software, 2020 8 Oct, Available from: https://www.seafile.com/home/.
136.A Personal Cloud to gather all your data, 2020 8 Oct, Available from: https://cozy.io/en/.
137.The Leader in Enterprise File Sync, 2020 8 Oct, Available from: https://www.getfilecloud.com/aerofs-vs-filecloud/.
138. Self hosted, instant, secure file sync, 2020 9 Oct, Available from: https://www.sparkleshare.org/.
139.DiskStation DS1813+, 2020 8 Oct, Available from: https://global.download.synology.com/download/Document/Hardware/DataSheet/DiskStation/13-year/DS1813+/cht/Synology_DS1813_Plus_Data_Sheet_cht.pdf.
140.鄧思源. 個人雲之數位調查與鑑識的研究. 2014年鑑識科學研討會, p175-181, 中央警察大學.
141.鄧思源. Android行動裝置之個人雲的研究. 2018年犯罪偵查與鑑識科學研討會, p231-236, 中央警察大學.
142.鄧思源、劉秉昕. vSphere為基礎之私有雲及數種個人雲鑑識之初探. 2015年犯罪偵查與鑑識科學研討會, p107-112, 中央警察大學.
143.Adobe portable document format version 1.4, 2012 20 Mar, Available from: https://www.adobe.com/content/dam/acom/en/devnet/pdf/pdfs/pdf_reference_archives/PDFReference.pdf.
144.ISO - ISO 16684-1_2012 - Graphic technology — Extensible metadata platform (XMP) specification — Part 1_ Data model, serialization and core properties, 2020 30 Oct, Available from: https://www.iso.org/standard/57421.html.

 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE