[5] Bermudez, J. D., Castro, J. J., Peralta, D. A., & Guacaneme, P. A. (2023). Tecnicas Avanzadas de Ciberseguridad: Integracion y Evolucion de la Kill Chain en Diversos Escenarios. arXiv preprint arXiv:2306.09242.
[6] Casey, E. (2009). Handbook of digital forensics and investigation. Academic Press.
[8] ISO/IEC 27037:2012 — Information technology — Security techniques — Guidelines for identification, collection, acquisition and preservation of digital evidence.2012.
[9] Kral, P. (2019). Information Security Reading Room: Incident Handler’s Handbook. Tech. rep. SANS Institute.
[13] JPCERT Coordination Center. (2022, December 21). LogonTracer. JPCERTCC/LogonTracer: Investigate Malicious Windows Logon by Visualizing and Analyzing Windows Event Log. https://github.com/JPCERTCC/LogonTracer
[18] GitHub - FsFang. (2023, Jan. 8). DFIR-Toolkit: This is a repo for cybersecurity analyst collecting artifacts in a incident response case. GitHub. https://github.com/fsfang/DFIR-Toolkit
[20] Shashidhar, N., & Novak, D. (2015). Digital forensic analysis on prefetch files. International Journal of Information Security Science, 4(2), 39-49.
[21] Carvey, H. (2011). Windows registry forensics: Advanced digital forensic analysis of the windows registry. Elsevier.
[22] Won, S. S., Jin, J., & Hong, J. I. (2009, April). Contextual web history: using visual and contextual cues to improve web browser history. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 1457-1466).
[23] Dolan-Gavitt, B. (2008). Forensic analysis of the Windows registry in memory. digital investigation, 5, S26-S32.