{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:00:16Z","timestamp":1725494416373},"publisher-location":"Boston, MA","reference-count":13,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387723662"},{"type":"electronic","value":"9780387723679"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-0-387-72367-9_1","type":"book-chapter","created":{"date-parts":[[2007,11,9]],"date-time":"2007-11-09T23:12:08Z","timestamp":1194649928000},"page":"1-12","source":"Crossref","is-referenced-by-count":8,"title":["FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints"],"prefix":"10.1007","author":[{"given":"John","family":"Haggerty","sequence":"first","affiliation":[]},{"given":"Mark","family":"Taylor","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Li, X. & Seberry, J., \u201cForensic Computing\u201d, Proceedings of INDOCRYPT, New Delhi, India, 8-10 Dec 2003, LNCS 2904, Springer, 2003, pp. 18\u201335.","DOI":"10.1007\/978-3-540-24582-7_2"},{"key":"1_CR2","volume-title":"Computer and Intrusion Forensics","author":"G. Mohay","year":"2003","unstructured":"Mohay, G., Anderson, A., Collie, B., De Vel, O. & McKemmish, R., Computer and Intrusion Forensics, Artech House, MA, USA, 2003."},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Chen, H., Chung, W., Xu, J.L., Wang, G., Qin, Y. & Chau, M., \u201cCrime Data Mining: A General Framework and Some Examples\u201d, Computer, April 2004, pp. 50\u201356.","DOI":"10.1109\/MC.2004.1297301"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Burr, W.E., \u201cCryptographic Hash Standards Where Do We Go from Here?\u201d, IEEE Security and Privacy, March\/April, 2006, pp. 88\u201391.","DOI":"10.1109\/MSP.2006.37"},{"key":"1_CR5","unstructured":"The Forensics Toolkit, available from http:\/\/www.accessdata.com , accessed October 2006."},{"key":"1_CR6","unstructured":"Guidance Software Encase, available from http:\/\/www.guidancesoftware.com , accessed October 2006."},{"key":"1_CR7","unstructured":"Jhead, available from http:\/\/www.sentex.net\/mwandel\/jhead , last updated April 2006, accessed October 2006."},{"key":"1_CR8","unstructured":"DataLifter Computer Forensic Software, available from http:\/\/datalifter.com\/products.htm , accessed October 2006."},{"key":"1_CR9","volume-title":"Proceedings of the 6th IEEE Systems, Man and Cybernetics Assurance Workshop","author":"W. J. Li","year":"2005","unstructured":"Li, W. J., Wang, K., Stolfo, S. & Herxog, B., \u201cFileprints: Identifying File Types by n-gram Analysis\u201d, Proceedings of the 6th IEEE Systems, Man and Cybernetics Assurance Workshop, West Point, NY, USA, June, 2005."},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Karresand, M. & Shahmehri, N., \u201cOscar \u2014 File Type Identification of Binary Data in Disk Clusters and RAM Pages\u201d, Proceedings of IFIP SEC 2006, Karlstadt, Sweden, 22 \u2014 24 May, 2006.","DOI":"10.1007\/0-387-33406-8_35"},{"key":"1_CR11","volume-title":"Proceedings of the 2006 IEEE Workshop on Information Assurance","author":"M. Karresand","year":"2006","unstructured":"Karresand, M. & Shahmehri, N., \u201cFile Type Identification of Data Fragments by their Binary Structure\u201d, Proceedings of the 2006 IEEE Workshop on Information Assurance, US Military Academy, West Point, NY, 21-23 June, 2006."},{"key":"1_CR12","unstructured":"Haggerty, J., Berry, T. & Gresty, D., \u201cForensic Signature Analysis of Digital Image Files\u201d, Proceedings of the Ist Conference on Advances in Computer Security and Forensics, Liverpool, UK, 13-14 July, 2006."},{"key":"1_CR13","unstructured":"Zhang, Y. & Paxson, V., \u201cDetecting Backdoors\u201d, Proceedings of USENIX Security Symposium, Denver, CO, USA, 2000."}],"container-title":["IFIP International Federation for Information Processing","New Approaches for Security, Privacy and Trust in Complex Environments"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-72367-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T08:58:10Z","timestamp":1556960290000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-72367-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9780387723662","9780387723679"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-72367-9_1","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2007]]}}}