| 期刊論文1. | Balasundaram, I.、Ramaraj, E.(2011)。An Authentication Scheme for Preventing SQL Injection Attack Using Hybrid Encryption。European Journal of Scientific Research,53(3),359-368。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | Chivers, H.(2014)。Private browsing: A window of forensic opportunity。Digital Investigation,11(1),20-29。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 3. | Dave, R.、Mistry, N.、Dahiya, M. S.(2014)。Volatile Memory Based Forensic Artifacts & Analysis。International Journal for Research in Applied Science and Engineering Technology,2(1),120-124。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 4. | Ghafarian, A.、Hosseini-Seno, Seyed Amin(2015)。Analysis of Privacy of Private Browsing Mode through Memory Forensics。International Journal of Computer Applications,132(16),27-34。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 5. | Kaur, D.、Kaur, P.(2016)。Empirical Analysis of Web Attacks。Procedia Computer Science,78(1),298-306。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 6. | 柯博淞、林曾祥、王旭正、左豪官(20140300)。數位鑑識之無痕瀏覽器證據調查研究。電子商務學報,16(1),85-105。 延伸查詢![new window](/gs32/images/newin.png) | 7. | Petroni, N. L.、Walters, A.、Fraser, T.、Arbaugh, W. A.(2006)。FATKit: A framework for the extraction and analysis of digital forensic data from volatile system memory。Digital Investigation,3(4),197-210。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 8. | Schatz, B.(2007)。BodySnatcher: towards reliable volatile memory acquisition by software。Digital Investigation,4(1),S126 -S134。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 9. | Seo, J.、Lee, S.、Shon, T.(2015)。A study on memory dump analysis based on digital forensic tools。Peer-to-Peer Networking and Applications,8(4),694-703。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 10. | Tsalis, N.、Mylonas, A.、Gritzalis, D.、Katos, V.(2017)。Exploring the protection of private browsing in desktop browsers。Computers & Security,67,181-197。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 會議論文1. | Hausknecht, K.、Foit, D.、Buric, J.(2015)。RAM data significance in Digital Forensics。38th International Convention on Information and Communication Technology, Electronics and Microelectronics,1372-1375。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | Ahmed, W.、Aslam, B.(2015)。A comparison of windows physical memory acquisition tools。IEEE Military Communications Conference,1292-1297。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 3. | Dija, S.、Suma, G. S.、Gonsalvez, D. D.、Pillai, A. T.(2016)。Forensic reconstruction of executables from Endows 7 physical memory。IEEE International Conference on Computational Intelligence and Computing Research。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 4. | Heriyanto, A.、Valli, C.、Hannay, P.(2015)。Comparison of Live Response, Linux Memory Extractor (LiME) and Mem Tool for Acquiring Android's Volatile Memory in the Malware Incident。Australian Digital Forensics Conference。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 5. | Hua, Q.、Zhang, Y.(2015)。Detecting Malware and Rootkit via Memory Forensics。International Conference on Computer Science and Mechanical Automation。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 6. | Johari, R.、Gupta, N.(2011)。Insecure Query Processing in the Delay/Fault Tolerant Mobile Sensor Network (DFT-MSN) and Mobile Peer to Peer Network。International Conference on Network Security and Applications。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 7. | Liming, C.、Jing, S.、Wei, Q.(2013)。Study on Forensic Analysis of Physical Memory。International Symposium on Computer,Communication, Control and Automation,221-224。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 8. | Moh, M.、Pininti, S.、Doddapaneni, S.、Moh, T. S.(2016)。Detecting Web Attacks Using Multi-Stage Log Analysis。IEEE International Conference on Advanced Computing。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 9. | Periyadi, G.、Mutiara, A.、Waya, R.(2017)。Digital forensics random access memory using live technique based on network attacked。International Conference on Information and Communication Technology。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 10. | Sharma, C.、Jain, S. C.(2014)。Analysis and Classification of SQL Injection Vulnerabilities and Attacks on Web Applications。International Conference on Advances in Engineering & Technology Research。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 11. | Suteva, N.、Mileva, A.(2014)。Computer Forensic Analysis of Some Web Attack。World Congress on Internet Security。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 其他1. | Reed, A.,Scanlon, M.(2017)。Forensic Analysis of Epic Privacy Browser on Windows Operating Systems,http://cyberforensicator.com/wp-content/uploads/2017/07IEpicPrivacyBrowsenLcompressed.pdf。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | OWASP Top Ten Project,http://www.owasp.org/index.php/Category: OWASP Top Ten Project.。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 3. | 12th Annual Application Security Statistics Report,https://info.whitehatsec.com/.。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 圖書論文1. | Montasari, R.、Peltola, P.(2015)。Computer Forensic Analysis of Private Browsing Modes。Global security, safety and sustainability: tomorrow's challenges of cyber security。Springer。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | |