Exposing vital forensic artifacts of USB devices in the Windows 10 registry
Approved for public release; distribution is unlimited === Digital media devices are regularly seized pursuant to criminal investigations and Microsoft Windows is the most commonly encountered platform on seized computers. Microsoft recently released a technical preview build of their Windows 10 ope...
Main Author: | Shaver, Jason S. |
---|---|
Other Authors: | Rowe, Neil |
Published: |
Monterey, California: Naval Postgraduate School
2015
|
Online Access: | http://hdl.handle.net/10945/45940 |
Similar Items
-
USB Artifact Analysis Using Windows Event Viewer, Registry and File System Logs
by: Ashar Neyaz, et al.
Published: (2019-11-01) -
Analysis of Windows 8 Registry Artifacts
by: Stormo, Jeremy M
Published: (2013) -
Forensic Analysis of the Windows 7 Registry
by: Khawla Abdulla Alghafli, et al.
Published: (2010-12-01) -
Portable Storage Forensics: enhancing the value of USB device analysis and reporting
by: Simms, Mark
Published: (2012) -
Design and Implementation of USB Device Driver Generator for Windows Operating Systems
by: Chung-Han Chang, et al.
Published: (2006)