Al-Zarouni, M., In: Introduction to mobile phone flasher devices and considerations for their use in mobile phone forensicsProceedings of 5th Australian Digital Forensics Conference. (2007).
Alles, E.J.; Geradts, Z.; Veenman, C., In: Source camera identification for low resolution heavily compressed imagesInternational Conference on Computational Sciences and Its Applications. (2008).
Breeuwsma, M., Forensic imaging of embedded systems using JTAG (boundary-scan), Digital Investigation 3 (2006) 32–42.
Breeuwsma, M.; de Jong, M.; Klaver, C.; van der Knijff, R.; Roeloffs, M., Forensic data recovery from flash memory, Small Scale Digital Device Forensic Journal 1 (2007).
Carrier, B., File system forensic analysis. (2005) Addison-Wesley Professional.
Casey, E., Tool review-WinHex, Digital Investigation 1 (2004) 114–128.
Chen, M.; Fridrich, J.; Goljan, M.; Lukáš, J., Source digital camcorder identification using sensor photo response non-uniformity, Proc. of SPIE Electronic Imaging (2007).
Ching-Yao, C., Fundamentals of crash sensing in automotive air bag systems. (2000) Society of Automotive Engineers, Inc, Warrendale, PA.
de Backer, C., Jaar-2000 checklist “Embedded systems”. Millennium Forum 2000. (1999) Compendium, Brussels.
Eagle, C., The IDA PRO book. (2008) No Starch Press.
Feldman, A.J.; Halderman, J.A.; Clarkson, W.; Paul, W.; Calandrino, J.A.; Appelbaum, J.; et al., Lest we remember: Cold boot attacks on encryption keys. Proc. 2008 USENIX Security Symposium. (2008) ; http://citp.princeton.edu/memory/.
Garfinkel, S.L., Carving contiguous and fragmented files with fast object validation, Digital Investigation 4 (2007) 2–12.
Grigoras, C., Applications of ENF criterion in forensic audio, video, computer and telecommunication analysis, Forensic Science International 167 (2007) 136–145.
Harrill, D.C.; Mislan, R.P., A small scale digital device forensics ontology, Small Scale Digital Device Forensic Journal 1 (2007).
IEEE Standards Association, IEEE Std 1149.1-2001 IEEE Standard Test Access Port and Boundary-Scan Architecture—Description. (2001) .
Jedec Solid State Technology Association, Common Flash Interface (CFI). (2003) .
Logic Technology, Universal socket solution. (2008) ; www.logic.nl.
Luck, J.; Stokes, M., An integrated approach to recovering deleted files from NAND flash data, Small Scale Digital Device Forensic Journal 2 (2008).
Mangard, S.; Oswald, E.; Popp, T., Power analysis attacks—revealing the secrets of smart cards. (2007) Springer Science+Business Media, LLC.
Me, G., In: Internal forensic acquisition for mobile equipmentsProceedings of the International Parallel and Distributed Processing Symposium (IPDPS). (2008).
Parker, S.P., McGraw-hill dictionary of scientific and technical terms. 5th ed. (1994) McGraw-Hill.
Rosenbluth, W., Investigation and interpretation of black box data in automobiles—A guide to the concepts and formats of computer data in vehicle safety and control systems. (2001) ASTM.
Samsung Electronics, Datasheet of the multi-chip package MEMORY, 256Mbit (16M ×16) synchronous burst, multi bank NOR flash memory / 512Mbit(32M×16) oneNAND, flash*2 / 128Mbit(8M×16) synchronous burst uni-transistor random access memory. (2004) ; www.samsung.com.
Zdziarski, J., iPhone forensics. (2008) O'Reilly.