(Figure 1) Various Types of Disaster Situations
(Figure 2) Complex Desktop Files
(Figure 4) Various Facilities Log Files Management
(Figure 3) Basic Concept for File Management
(Figure 5) File Management Functions
(Figure 6) Main UI of File Management Tool
(Figure 7) Rules Setting UIl
(Figure 8) Result Information View UI
(Figure 9) Unmanaged Directory
(Figure 10) Managed Directory
(Figure 11) Main UI with an Example: 5 conditions setting
(Figure 12) Condition Setting Popup Window UI
(Figure 13) Result Information with an Example
(Figure 14) Result of Unmanaged Directory with an Example
(Figure 15) Result of Managed Directories with an Example
(Figure 16) A Platform and Its Facility Log Management Part (Process-Aware Drone-Equipped 3D Engine and Wireless Control Measurement Platform for Integrated Management of SOC Facilities)
(Table 1) Condition of a Rules
(Table 2) Rule Configurations with an Example
References
- Pung, William, and Andrew Woodward, "Does the use of MIMO Technology used by 802.11 n Reduce or Increase the Impact of Denial of Service Attacks?" 2010. https://doi.org/10.4225/75/57b2b2fb40ce1
- Beckman, David, and David Hirsch, "Hard Drive Homicide," ABA JOURNAL, 92, 62-62, 2006. www.abajournal.com/magazine/archives/2006
- James, Delores C., et al., "Participation of African Americans in e-Health and m-Health studies: A systematic review," Telemedicine and e-Health, 23.5, 351-364, 2017. https://doi.org/10.1089/tmj.2016.0067
- Shavers, Brett. Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard. Newnes, 2013.
- Wickramasinghe, Samanthi, and Sunesh Hettiarachchi, "Use of Computer Forensics and Its Implications," 2016.
- Collie, Aaron, Lucas Mak, and Shawn Nicholson, "One Stone, Two Birds: Data Assessment Framework for Digital Collection Audit and Preservation," Archiving Conference, Vol. 2011, No. 1, Society for Imaging Science and Technology, 2011. https://www.ingentaconnect.com/content/ist/ac/2011/00002011/00000001;jsessionid=767hh1go7hv1.x-ic-live-02
- Workbench, Compuware. "William McKnight's Information Management (Elsever/Morgan Kaufmann)."
- Anderson, Wells H. "New backup options to protect your work," GPSolo, 30, 53, 2013. https://heinonline.org/HOL/LandingPage?handle=hein.jo urnals/gpsolo30&div=96&id=&page=
- Whitt, Phillip, "Additional Software Products," Pro Freeware and Open Source Solutions for Business. Apress, Berkeley, CA, 235-241, 2015. https://doi.org/10.1007/978-1-4842-1130-4_12
- Choi, JongCheon, et al. "A static birthmark for MS windows applications using import address table," Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2013 Seventh International Conference on. IEEE, 2013. https://doi.org/10.1109/IMIS.2013.159
- Grimm, Dean. "WinMerge," 2010. http://winmerge.org/?lang=en
- Winn, Khine Zar Ne, "Quantifying and Validation of Changeability and Extensibility for Aspect-Oriented Software," International Conference on Advances in Engineering and Technology (ICAET'2014). Singapore. 2014.
- Abebe, Surafel Lemma, et al., "Analyzing the evolution of the source code vocabulary," Software Maintenance and Reengineering, 2009. CSMR'09. 13th European Conference on. IEEE, 2009. https://doi.org/10.1109/CSMR.2009.61
- Wickramasinghe, Samanthi, and Sunesh Hettiarachchi, "Use of Computer Forensics and Its Implications," 2016.
- bt Yusof, Nadiah, Amirah Ismail, and Nazatul Aini Abd Majid. "Deduplication image middleware detection comparison in standalone cloud database," 2016. http://warse.org/IJACST/static/pdf/Issue/icdcb2016sp03.pdf
- Seleborg, Svante, "Axantum Strong Software Licensing," Retrieved at<>, Version 0.3, 6, 2004. http://www.axantum.com/AxCrypt/etc/Axantum-Strong-Licensing.pdf
- Perkins, Jethro. "Information Management and Technology," 2014. https://info.lse.ac.uk/staff/Services/Policies-and-procedures/Assets/Documents/infSecPol.pdf
- Tatli, Emin Islam. "Google reveals cryptographic secrets." Kryptowochenende 2006-Workshop uber Kryptographie Universitat Mannheim. 2006. http://th.informatik.uni-mannheim.de/people/tatli.shtml
- Ruengtam, Porntip, "Learning Efficiency in Theoretical Subjects of Interior Architecture by Cooperative/Collaborative Learning Technique," Procedia-Social and Behavioral Sciences, 68, 281-294, 2012. https://doi.org/10.1016/j.sbspro.2012.12.227
- Hargreaves, Christopher, and Howard Chivers, "A Virtualisation Based Forensic Computing Research Tool," https://www.researchgate.net/profile/Christopher_Hargreaves/publication/264543639_A_Virtualisation_Based_Forensic_Computing_Research_Tool/links/53e3b5230cf2fb74870db859/A-Virtualisation-Based-Forensic-Computing-Research-Tool.pdf
- Agarkhed, Jayashree, and Sumaiyya Joohi, "Smart work for college-be digital." Inventive Computation Technologies (ICICT), International Conference on., Vol. 2. IEEE, 2016. https://doi.org/10.1109/INVENTIVE.2016.7824908
- Andrew Tabona, "The Top 20 Free File Management Tools for Sys Admins", TechTalk, July 24, 2013
- Minjae Park, et al., "A Process-Aware Drone-Equipped 3D Engine and Wireless Control Measurement Platform for Integrated Management of SOC Facilities," ICACT Transactions on Advanced Communications Technology (ICACT-TACT), November 30, 2017. http://icact.org/upload/2018/0684/20180684_finalpaper.pdf