{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:27:23Z","timestamp":1725460043250},"publisher-location":"Boston, MA","reference-count":23,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781402080692"},{"type":"electronic","value":"9781402080708"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/1-4020-8070-0_1","type":"book-chapter","created":{"date-parts":[[2006,3,2]],"date-time":"2006-03-02T08:21:25Z","timestamp":1141287685000},"page":"3-15","source":"Crossref","is-referenced-by-count":2,"title":["Remote Computer Fingerprinting for Cyber Crime Investigations"],"prefix":"10.1007","author":[{"given":"Jon","family":"Novotny","sequence":"first","affiliation":[]},{"given":"Dominic","family":"Schulte","sequence":"additional","affiliation":[]},{"given":"Gavin","family":"Manes","sequence":"additional","affiliation":[]},{"given":"Sujeet","family":"Shenoi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"M. Andress. Network scanners pinpoint problems. Network World, February 2, 2002."},{"key":"1_CR2","first-page":"745","volume":"60","author":"B. Bell","year":"1999","unstructured":"B. Bell. Secrets and lies: News media and law enforcement use of deception as an investigative tool. University of Pittsburgh Law Review, 60:745\u2013837, 1999.","journal-title":"University of Pittsburgh Law Review"},{"key":"1_CR3","volume-title":"Law of Internet Security and Privacy","author":"K. Connolly","year":"2003","unstructured":"K. Connolly. Law of Internet Security and Privacy. Aspen, New York, 2003."},{"key":"1_CR4","first-page":"1053","volume":"32","author":"M. Elmore","year":"2001","unstructured":"M. Elmore. Big brother where art thou? Electronic surveillance and the Internet: Carving away Fourth Amendment privacy protections. Texas Tech Law Review, 32:1053\u20131083, 2001.","journal-title":"Texas Tech Law Review"},{"key":"1_CR5","unstructured":"R. Farrow. System fingerprinting with Nmap. Network Magazine, November 5, 2000."},{"key":"1_CR6","unstructured":"Federal Bureau of Investigation. A Parent\u2019s Guide to Internet Safety. www.fbi.gov, 2002."},{"key":"1_CR7","unstructured":"J. Forristal and G. Shipley. Vulnerability assessment scanners. Network Computing, January 8, 2001."},{"key":"1_CR8","unstructured":"Fyodor. The art of port scanning. www.insecure.org, 1997."},{"key":"1_CR9","unstructured":"Fyodor. Remote operating system detection via TCP\/IP stack fingerprinting. www.insecure.org, 2002."},{"key":"1_CR10","unstructured":"GFI Software. LANGuard Network Security Scanner. www.gfi.com."},{"key":"1_CR11","unstructured":"J. Leonard and M. Morin. Stalking the web predator. Los Angeles Times, January 17, 2002."},{"key":"1_CR12","unstructured":"A. Meehan, et al. Packet sniffing for automated chat room monitoring and evidence preservation. Proceedings of the 2001 Workshop on Information Assurance and Security, 285\u2013288, 2001."},{"issue":"23","key":"1_CR13","doi-asserted-by":"publisher","first-page":"3011","DOI":"10.1001\/jama.285.23.3011","volume":"285","author":"K. Mitchell","year":"2001","unstructured":"K. Mitchell, D. Finkelhor and J. Wolak. Risk factors for and impact of online sexual solicitation of youth. Journal of the American Medical Association, 285(23):3011\u20133014, June 20, 2001.","journal-title":"Journal of the American Medical Association"},{"key":"1_CR14","unstructured":"A. Moenssens, editor. Amendments to the Federal Rules of Evidence. www.forensic-evidence.com, 2003."},{"key":"1_CR15","unstructured":"J. Nazario. Passive system fingerprinting using network client applications. Crimelabs Security Group. www.crimelabs.net, January 19, 2001."},{"key":"1_CR16","unstructured":"Nessus. Documentation. www.nessus.org."},{"key":"1_CR17","first-page":"53","volume":"4708","author":"J. Novotny","year":"2002","unstructured":"J. Novotny, et al. Evidence acquisition tools for cyber sex crimes investigations, Proceedings of the SPIE Conference on Sensors and C31 Technologies for Homeland Defense and Law Enforcement, 4708:53\u201360, 2002.","journal-title":"Proceedings of the SPIE Conference on Sensors and C31 Technologies for Homeland Defense and Law Enforcement"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"K. Ramakrishnan, S. Floyd and D. Black. The addition of explicit congestion notification (ECN) to IP. RFC 3168, September 2001.","DOI":"10.17487\/rfc3168"},{"key":"1_CR19","first-page":"177","volume":"16","author":"E. Sinrod","year":"2000","unstructured":"E. Sinrod, et al. Cyber-crimes: A practical approach to the application of federal computer crime laws. Santa Clara Computer and High Technology Law Journal, 16:177\u2013232, 2000.","journal-title":"Santa Clara Computer and High Technology Law Journal"},{"key":"1_CR20","doi-asserted-by":"crossref","DOI":"10.1201\/9781420048872","volume-title":"Investigating Computer-Related Crime","author":"P. Stephenson","year":"1999","unstructured":"P. Stephenson. Investigating Computer-Related Crime. CRC Press, Boca Raton, Florida, 1999."},{"issue":"2","key":"1_CR21","first-page":"8","volume":"49","author":"R. Strang","year":"2001","unstructured":"R. Strang. Recognizing and meeting Title III concerns in computer investigations. United States Attorneys\u2019 Bulletin, 49(2):8\u201313, 2001.","journal-title":"United States Attorneys\u2019 Bulletin"},{"key":"1_CR22","unstructured":"U.S. Department of Justice. Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations. www.cybercrime.gov, 2002."},{"key":"1_CR23","first-page":"75","volume":"8","author":"R. Winick","year":"1994","unstructured":"R. Winick. Searches and seizures of computers and computer data. Harvard Journal of Law & Technology, 8:75\u2013128, 1994.","journal-title":"Harvard Journal of Law & Technology"}],"container-title":["IFIP International Federation for Information Processing","Data and Applications Security XVII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/1-4020-8070-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,17]],"date-time":"2019-04-17T04:31:30Z","timestamp":1555475490000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/1-4020-8070-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9781402080692","9781402080708"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/1-4020-8070-0_1","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2004]]}}}