Keywords: technique, post-incident internal audit, computer incident, computer forensics, information security, computer devices
References
1. Pantiukhin I.S., Zikratov I.A., Levina A.B. Graph-based post incident internal audit method of computer equipment.
Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2016, vol. 16, no. 3, pp. 506–512. (In Russian) doi:
10.17586/2226-1494-2016-16-3-506-512
2. Nelson B., Phillips A., Steuart C. Guide to Computer Forensics and Investigations: Processing Digital Evidence. 5th ed. Cengage Learning, 2016, 752 p.
3. Altheide C., Carvey H. Digital Forensics with Open Source Tools. Elsevier, 2011, 288 p.
4. Polstra P. Linux Forensics. Pentester Academy, 2015, 370 p.
5. Physical Memory Attacks. Available at: https://privatecore.com/resources-overview/physical-memory-attacks/ (accessed 08.02.2017).
6. Bishop M. An overview of computer viruses in a research environment. Technical Report PCS-TR91-156. Dartmouth College, Hanover, 1990.
7. Choi H., Lee H., Kim H. Fast detection and visualization of network attacks on parallel coordinates //
Computers and Security, 2009, vol. 28, no. 5, pp. 276–288. doi:
10.1016/j.cose.2008.12.003
8. Hickok G. Digital Forensics Global Trends. 2014. Available at: http://www.security-daily.com/dsp_getFeaturesDetails.cfm?CID=3875 (accessed 08.02.2017).
9. Tanenbaum A.S., Austin T. Structured Computer Organization. 6th ed. Pearson, 2012, 800 p.
10. Volonino L., Anzaldua R. Computer Forensics for Dummies. John Wiley & Sons, 2008, 388 p.
11. Solomon M.G., Rudolph K., Tittel E. et al. Computer Forensics JumpStart. John Wiley & Sons, 2011, 336 p.
12. Nelson B., Phillips A., Steuart C. Guide to Computer Forensics and Investigations. Cengage Learning, 2014, 720 p.
13. Kaspersky K. Data Recovery. Manual. St. Petersburg, BKhV-Peterburg Publ., 2006, 352 p. (In Russian)
14. Senkevich G.E. Art of Data Recovery. St. Petersburg, BKhV-Peterburg Publ., 2011, 304 p. (In Russian)
15. Tashkov P.A. 100% Data Recovery. St. Petersburg, Piter Publ., 2008, 206 p. (In Russian)
16. Burdach M. Physical Memory Forensics. Black Hat, USA, 2006, 53 p.
17. Ligh M.H., Case A., Levy J., Walters A. The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory. Wiley, 2014, 912 p.
18. Case A., Richard G.G. Memory forensics: the path forward.
Digital Investigation, 2017, vol. 20, pp. 22–33. doi:
10.1016/j.diin.2016.12.004
19. Davidoff S., Ham J. Network Forensics: Tracking Hackers through Cyberspace. Prentice Hall, 2012, 576 p.
20. Meghanathan N., Allam S.R., Moore L.A. Tools and techniques for network forensics. arXiv preprint arXiv:1004.0570, 2010.
21. Zikratov I., Pantiukhin I., Sizykh A. The method of classification of user and system data based on the attributes.
Proc. 18th Conference of Open Innovations Association. St. Petersburg, Russia, 2016, pp. 404–409. doi:
10.1109/FRUCT-ISPIT.2016.7561557
22. Zikratov I.A., Pantiukhin I.S., Krivtsova I.E., Druzhinin N.K. The method of elf-files identification based on the metric classification.
Proc. 18th Conference of Open Innovations Association. St. Petersburg, Russia, 2016, pp. 397–403. doi:
10.1109/FRUCT-ISPIT.2016.7561556
23. Krivtsova I.E., Salakhutdinova K.I., Yurin I.V. Method of executable filts identification by their signatures.Vestnik Gosudarstvennogo Universiteta Morskogo i Rechnogo Flota imeni Admirala S.O. Makarova, 2016, no. 1, pp. 215–224. (In Russian)
24. Vorobeva A.A. Dynamic feature selection for web user identification on linguistic and stylistic features of online texts.
Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2017, vol. 17, no. 1, pp. 117–128. (In Russian). doi:
10.17586/2226-1494-2017-17-1-117-128
25. Vorobeva A.A. Examining the performance of classification algorithms for imbalanced data sets in web author identification.
Proc. 18th Conference of Open Innovations Association. St. Petersburg, Russia, 2016, pp. 385–390. doi:
10.1109/fruct-ispit.2016.7561554
26. Vorobeva A.A. Forensic linguistics: automatic web author identification.
Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2016, vol. 16, no. 2, pp. 295–302. (In Russian).doi:
10.17586/2226-1494-2016-16-2-295-302
Yurin I.V., Pantyukhin I.S. Testing the hypothesis of creating a digital polygraph based on video and audio data. Vestnik Gosudarstvennogo Universiteta Morskogo i Rechnogo Flota imeni Admirala S.O. Makarova, 2015, no. 3, pp. 202–209. (In Russian)