[1]
W. Jekot, “Computer Forensics, Search Strategies, and the Particularity Requirement”, tlp, vol. 7, Apr. 2007.