Tri Rochmadi (1)
G. Patel, “Anti-Forensics Techniques for browsing artifacts,†2014.
J. Oh, S. Lee, and S. Lee, “Advanced evidence collection and analysis of web browser activity 5,†vol. 8, pp. 0–8, 2011.
D. G. Dharan, “Forensic Evidence Collection by Reconstruction of Artifacts in Portable Web Browser,†2014.
G. Aggarwal, E. Burzstein, C. Jackson, and D. Boneh, “An Analysis of Private Browsing Modes in Modern Browsers,†California, 2010.
S. Rahman and M. N. A. Khan, “Review of Live Forensic Analysis Techniques,†vol. 8, no. 2, pp. 379–388, 2015.
Garcia, Gabriela Limon, "Forensic Physical Memory Analysis: An Overview of Tools and Techniques Technical Report," Helsinki University of Technology, 2007.
A. Jain and V. Richariya, “Implementing a Web Browser with Phishing Detection Techniques,†World Comput. Sci. Inf. Technol. J., vol. 1, no. 7, pp. 289–291, 2011.
L. Ran and H. Jin, “Analysis Framework to Detect Artifacts of Portable Web Browser,†2012.
B. R. Jones, Internet Forensics, no. October. 2005.
Li, W, "Anti-forensic Digital Investigation for Unauthorized Intrusion on a Wireless Network," Auckland, 2013.
M. K. Rogers, R. Mislan, J. Goldman, T. Wedge, and S. Debrota, “Computer Forensics Field Triage Process Model,†Conf. Digit. Forensics, Secur. Law, vol. 1, no. 2, pp. 27–40, 2006.
Rekhis, S., & Boudriga, N., "A System for Formal Digital Forensic Investigation Aware of Anti-Forensic Attacks," Information Forensics and Security, 635-650, 2012.
Sammons, J, "The Basics of Digital Forensics," Waltham: Syngress, 2012.