{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T05:18:10Z","timestamp":1737609490798,"version":"3.33.0"},"publisher-location":"New York, NY","reference-count":25,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9780387737416"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-73742-3_1","type":"book-chapter","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T10:45:53Z","timestamp":1194950753000},"page":"3-19","source":"Crossref","is-referenced-by-count":2,"title":["Calibration Testing Of Network Tap Devices"],"prefix":"10.1007","author":[{"given":"Barbara","family":"Endicott-Popovsky","sequence":"first","affiliation":[]},{"given":"Brian","family":"Chee","sequence":"additional","affiliation":[]},{"given":"Deborah","family":"Frincke","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/35.707822","volume":"36","author":"R. Addie","year":"1998","unstructured":"R. Addie, M. Zukerman and T. Neame, Broadband traffic modeling: Simple solutions to hard problems, IEEE Communications, vol. 36, pp. 2\u20139, 1998.","journal-title":"IEEE Communications"},{"key":"1_CR2","unstructured":"Agilent Technologies, Metrology Forum: Basics, Terminology ( http:\/\/www.agilent.com\/metrology\/terminology.shtml )."},{"key":"1_CR3","unstructured":"Agilent Technologies, Metrology Forum: Basics, Why calibrate? ( http:\/\/www.agilent.com\/metrology\/why-cal.shtml )."},{"key":"1_CR4","volume-title":"presented at The Agora","author":"N. Allen","year":"2006","unstructured":"N. Allen, Are you seeing what you expected? presented at The Agora, University of Washington, Seattle, Washington, 2006."},{"key":"1_CR5","volume-title":"The Tao Of Network Security Monitoring: Beyond Intrusion Detection","author":"R. Bejtlich","year":"2005","unstructured":"R. Bejtlich, The Tao Of Network Security Monitoring: Beyond Intrusion Detection, Addison-Wesley, Boston, Massachusetts, 2005."},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"S. Bradner and J. McQuaid, RFC 2544 \u2014Benchmarking Methodology for Network Interconnect Devices, IETF Network Working Group ( http:\/\/www.faqs.org\/rfcs\/rfc2544.html ), 1999.","DOI":"10.17487\/rfc2544"},{"key":"1_CR7","unstructured":"B. Carrier and E. Spafford, Getting physical with the digital investigation process, International Journal of Digital Evidence, vol. 2(2), 2003."},{"key":"1_CR8","volume-title":"NetOptics 10\/100BaseT Dual Port Aggregator Tap, Spirent Test Center Technical Report","author":"B. Endicott-Popovsky","year":"2006","unstructured":"B. Endicott-Popovsky and B. Chee, NetOptics 10\/100BaseT Dual Port Aggregator Tap, Spirent Test Center Technical Report, Advanced Network Computing Laboratory, University of Hawaii at Manoa, Honolulu, Hawaii, 2006."},{"key":"1_CR9","unstructured":"B. Endicott-Popovsky and D. Frincke, Adding the fourth \u201cR\u201d \u2014A systems approach to solving the hacker\u2019s arms race, presented at the Hawaii International Conference on System Sciences Symposium ( http:\/\/www.itl.nist.gov\/iaui\/vvrg\/hicss39 ), 2006."},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"B. Endicott-Popovsky and D. Frincke, Embedding forensic capabilities into networks: Addressing inefficiencies in digital forensics investigations, Proceedings from the Seventh IEEE Systems, Man and Cybernetics Information Assurance Workshop, pp. 133\u2013139, 2006.","DOI":"10.1109\/IAW.2006.1652087"},{"key":"1_CR11","volume-title":"Case No. 98-14068-CR, Southern District of Florida, Fort Pierce Division, Fort Pierce, Florida, September 13","author":"M. Lawson","year":"2000","unstructured":"M. Lawson, Expert Witness Testimony (United States vs. Jimmy Myers Brown (Defendant), Case No. 98-14068-CR, Southern District of Florida, Fort Pierce Division, Fort Pierce, Florida, September 13, 2000), Global CompuSearch, Spokane, Washington, 2006."},{"key":"1_CR12","volume-title":"Network Performance Baselining","author":"D. Nassar","year":"2000","unstructured":"D. Nassar, Network Performance Baselining, Sams, Indianapolis, Indiana, 2000."},{"key":"1_CR13","unstructured":"I. Orton, King County (Washington) Prosecutor, personal communication, 2006."},{"key":"1_CR14","unstructured":"M. Pollitt, Unit Chief FBI CART (Retired), personal communication, 2005."},{"key":"1_CR15","volume-title":"Incident Response: A Strategic Guide to Handling System and Network Security Breaches","author":"S. E","year":"2001","unstructured":"E. Schultz and R. Shumway, Incident Response: A Strategic Guide to Handling System and Network Security Breaches, Sams, Indianapolis, Indiana, 2001."},{"key":"1_CR16","unstructured":"M. Simon, Chief Technology Officer, Conjungi Corporation, Seattle, Washington, personal communication, 2005."},{"key":"1_CR17","volume-title":"A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony as an Expert Technical Witness","author":"F. Smith","year":"2003","unstructured":"F. Smith and R. Bace, A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony as an Expert Technical Witness, Pearson Education, Boston, Massachusetts, 2003."},{"key":"1_CR18","volume-title":"presented at the Computer Forensics Workshop","author":"P. Sommers","year":"2002","unstructured":"P. Sommers, Emerging problems in digital evidence, presented at the Computer Forensics Workshop, University of Idaho, Moscow, Idaho, 2002."},{"key":"1_CR19","unstructured":"Spirent Communications, Spirent TestCenter ( http:\/\/www.spirent.com\/analysis\/technology.cfm?media=7& WS=325& SS=117& wt=2 )."},{"key":"1_CR20","unstructured":"J. Tan, Forensic readiness, Technical report, @stake, Cambridge, Massachusetts, 2001."},{"key":"1_CR21","unstructured":"Y. Tang and T. Daniels, A simple framework for distributed forensics, Proceedings of the Twenty-Fifth IEEE International Conference on Distributed Computing Systems, pp. 163\u2013169, 2005."},{"key":"1_CR22","unstructured":"The Tipmra, The genuine Tipmra speeding ticket defense ( http:\/\/www.tipmra.com\/new_tipmra\/washington_state_speeding_ticket.htm )."},{"key":"1_CR23","first-page":"1013","volume":"293","author":"U.S. Circuit Court of Appeals DC Circuit), Frye v. United States","year":"1923","unstructured":"U.S. Circuit Court of Appeals (DC Circuit), Frye v. United States, Federal Reporter, vol. 293, pp. 1013\u20131014, 1923.","journal-title":"Federal Reporter"},{"key":"1_CR24","first-page":"579","volume":"509","author":"U.S. Supreme Court, Daubert v. Merrell Dow Pharmaceuticals, Inc.","year":"1993","unstructured":"U.S. Supreme Court, Daubert v. Merrell Dow Pharmaceuticals, Inc., United States Reports, vol. 509, pp. 579\u2013601, 1993.","journal-title":"United States Reports"},{"key":"1_CR25","first-page":"137","volume":"526","author":"U.S. Supreme Court, Kumho Tire Co. v. Carmichael","year":"1999","unstructured":"U.S. Supreme Court, Kumho Tire Co. v. Carmichael, United States Reports, vol. 526, pp. 137\u2013159, 1999.","journal-title":"United States Reports"}],"container-title":["IFIP \u2014 The International Federation for Information Processing","Advances in Digital Forensics III"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73742-3_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T07:35:00Z","timestamp":1737531300000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73742-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387737416"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73742-3_1","relation":{},"subject":[]}}