:::

詳目顯示

回上一頁
題名:跨境APT資安事件的證據調查與數位鑑識分析之研究
書刊名:警學叢刊
作者:高大宇
作者(外文):Kao, Da-yu
出版日期:2018
卷期:48:5=237
頁次:頁1-22
主題關鍵詞:數位鑑識網路犯罪犯罪重建跨境合作Digital forensicsCybercrimeAdvanced persistent threatAPTCybercrime reconstructionCross-border cooperation
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:3
期刊論文
1.SWGDE、ICOE(2000)。Digital Evidence: Standards and Principles。Forensic Science Communications,2(2)。  new window
會議論文
1.Chen, W. S.(2010)。Cyber Security Management and Loss Estimation Using Copulas。2010 International Security Technology and Management Conference。Taipei:Jhonghua Association of Security Technology and Management。  new window
2.Lin, C.、Li, Z.、Gao, G.(2009)。Automated Analysis of Multi-source Logs for Network Forensics。2009 First International Workshop on Education Technology and Computer Science。Wuhan, Hubei:IEEE。  new window
3.Palmer, G.(2001)。DFRWS Technical Report: A Road Map for Digital Forensic Research。First Digital Forensic Research Workshop。New York:Air Force Research Laboratory。  new window
研究報告
1.Stevens, G.(2011)。Privacy Protections for Personal Information Online。Washington, DC。  new window
圖書
1.Jonathan, C.(2010)。Principles of Cybercrime。Cambridge:Cambridge University Press。  new window
2.Jewkes, Y.、Yar, M.(2010)。Handbook of Internet Crime。Willan Publishing。  new window
3.Casey, Eoghan(2011)。Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet。Elsevier。  new window
4.Bernik, I.(2014)。Cybercrime and Cyber Warfare。NJ:John Wiley & Sons Inc。  new window
5.Corera, G.(2015)。Intercept: The Secret History of Computers and Spies。London:Orion Publishing。  new window
6.Pearson, S.、Watson, R.(2010)。Digital Triage Forensics: Processing the Digital Crime Scene。MA:Elsevier Inc。  new window
7.SWGDE(2014)。SWGDE Best Practices for Computer Forensics, Version: 3.1.。Virginia:Scientific Working Group on Digital Evidence。  new window
其他
1.Blue Coat Systems Inc.(2013)。Blue Coat Systems 2013 Mobile Malware Report - How Users Drive the Mobile Threat Landscape,http://www.bluecoat.com., 。  new window
2.趨勢科技全球技術支援與研發中心(2012)。認識APT--進階持續性滲透攻擊,http://blog.trendmicro.com.tw/?p=986, 2013/12/30。  延伸查詢new window
3.National Institute of Justice(2001)。Electronic Crime Scene Investigation: A Guide for First Responders,http://www.ncjrs.org/pdffiles1/nij/187736.pdf。  new window
4.台灣地區認基金會(2016)。實驗室認證,http://www.taftw.org.tw/。  延伸查詢new window
5.戴志揚(2012)。大陸網軍人侵海巡署3,000機密外洩,http://magazine.chinatimes.com/ctweekly/20120713003175-300106。  延伸查詢new window
6.ACPO(2012)。2012 ACPO Good Practice Guide for Digital Evidence,http://library.college.police.uk/docs/acpo/digital-evidence-2012.pdf.。  new window
7.Greenberg, A.(2016)。The Silk Road's Dark-Web Dream Is Dead,https://www.wired.com/2016/01/the-silk-roads-dark-web-dream-is-dead/。  new window
8.IBM Corporation(2013)。IBM X-Force 2013 Mid-Year Trend and Risk Report,http://public.dhe.ibm.com/common/ssi/ecm/en/wgl03036usen/wgl03036usen.pdf.。  new window
9.IBM Corporation(2016)。IBM X-Force Threat Intelligence Report,http://www.foerderland.de/fileadmin/pdf/IBM_XForce_Report_2016.pdf.。  new window
10.Kaspersky Team(2016)。Larger than meets the eye: xDedic follow-up,https://www.kaspersky.com/blog/xdedic-ii/15147。  new window
11.Maor, E.(2013)。Carberp Source Code for Sale: Free Bootkit Included!,https://securityintelligence.com/carberp-source-code-sale-free-bootkit-included/。  new window
12.Send2Press Newswire(2011)。ADF Solutions and the High Tech Crime Institute Team Up to Educate Investigators on Leading Forensic Triage Tools,http://send2pressnewswire.com/2011/08/08/s2p5124_163905.php.。  new window
13.Sophos Ltd.(2015)。Our cybersecurity predictions for 2016,https://blogs.sophos.com/2015/12/11/our-cybersecurity-predictions-for-2016/#tip10。  new window
14.USA Attorney's Office(2014)。Cyber Criminal Pleads Guilty to Developing and Distributing Notorious SpyEye Malware,http://www.fbi.gov/atlanta/press-releases/2014/cyber-criminal-pleads-guilty-to-developingand-distributing-notorious-spyeye-malware.。  new window
15.USA DHS,FBI(2016)。Grizzly Steppe - Russian Malicious Cyber Activity,https://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLYSTEPPE-2016-1229.pdf。  new window
16.USA NIJ(2004)。Forensic Examination of Digital Evidence: A Guide for Law Enforcement,https://www.ncjrs.gov/pdffilesl/nij/199408.pdf.。  new window
17.USA NIJ(2008)。Electronic Crime Scene Investigation: A Guide for First Responders,https://www.ncjrs.gov/pdffilesl/nij/219941.pdf.。  new window
18.Verizon RISK Team(2014)。2014 Data Breach Investigations Report,http://www.verizonenterprise.com/DBIR/2014/.。  new window
19.Verizon RISK Team(2015)。Data Breach Investigations Report,http://www.verizonenterprise.com/DBIR/2015/.。  new window
20.Zetter, K.(2014)。Coder Behind Notorious Bank-Hacking Tool Pleads Guilty,https://www.wired.com/2014/01/spy-eye-author-guilty-plea/。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE