security of SCADA/ICS systems (Ref 2) Existing tools for computer forensics cannot easily be extended to these industrial applications
forensic.pdf
Computer forensics software complement the hardware tools available to law enforcement While the hardware tools such as write-blockers primarily focus on
Digital-Forensics-Tools-TN_0716-508.pdf
Computer forensics specialists use powerful software tools to uncover data to be sorted through, and then must figure out the important facts and how
computer%20forensics%20an%20essential%20ingredient%20for%20cyber%20security%20-%20journal%20of%20information%20science%20and%20technology.pdf
forensic software tools, computer forensic hardware tools, validating and Software Forensics Collecting Evidence from the Scene of a Digital Crime by
R15A0533%20CF.pdf
Cyber forensics has been in the popular mainstream for some time, and has Control Systems Cyber Security Self Assessment Tool
Forensics_RP.pdf