{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:10:51Z","timestamp":1725495051943},"publisher-location":"New York, NY","reference-count":13,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9780387737416"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-73742-3_16","type":"book-chapter","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T10:45:53Z","timestamp":1194950753000},"page":"231-244","source":"Crossref","is-referenced-by-count":6,"title":["File System Journal Forensics"],"prefix":"10.1007","author":[{"given":"Christopher","family":"Swenson","sequence":"first","affiliation":[]},{"given":"Raquel","family":"Phillips","sequence":"additional","affiliation":[]},{"given":"Sujeet","family":"Shenoi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"F. Buchholz, The structure of the Reiser file system (\n                    http:\/\/homes.cerias.purdue.edu\/~florian\/reiser\/reiserfs.php\n                    \n                  )."},{"key":"16_CR2","unstructured":"R. Card, T. Ts\u2019o and S. Tweedie, Design and implementation of the Second Extended File System, Proceedings of the First Dutch International Symposium on Linux (\n                    http:\/\/web.mit.edu\/tytso\/www\/linux\/ext2intro.html\n                    \n                  ), 1994."},{"key":"16_CR3","volume-title":"File System Forensic Analysis","author":"B. Carrier","year":"2005","unstructured":"B. Carrier, File System Forensic Analysis, Addison-Wesley, Crawfordsville, Indiana, 2005."},{"key":"16_CR4","volume-title":"Introduction to Algorithms","author":"T. Cormen","year":"2001","unstructured":"T. Cormen, C. Leiserson, R. Rivest and C. Stein, Introduction to Algorithms, MIT Press, Cambridge, Massachusetts, 2001."},{"key":"16_CR5","unstructured":"Fedora Project Board, Fedora Core (fedoraproject.org)."},{"key":"16_CR6","volume-title":"Technical Report CSE-TR-254-95","author":"G. Ganger","year":"1995","unstructured":"G. Ganger and Y. Patt, Soft Updates: A Solution to the Metadata Update Problem in File Systems, Technical Report CSE-TR-254-95, Computer Science and Engineering Division, University of Michigan, Ann Arbor, Michigan, 1995."},{"key":"16_CR7","unstructured":"NTFS.com, Data integrity and recoverability with NTFS (\n                    http:\/\/www.ntfs.com\/data-integrity.htm\n                    \n                  )."},{"key":"16_CR8","first-page":"245","volume-title":"Advances in Digital Forensics","author":"S. Piper","year":"2005","unstructured":"S. Piper, M. Davis, G. Manes and S. Shenoi, Detecting misuse in reserved portions of ext2\/3 file systems, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, New York, pp. 245\u2013256, 2005."},{"key":"16_CR9","unstructured":"H. Reiser, ReiserFS v3 whitepaper (\n                    http:\/\/www.namesys.com\/X0reiserfs.html\n                    \n                  ), 2002."},{"issue":"1","key":"16_CR10","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1145\/146941.146943","volume":"10","author":"M. Rosenblum","year":"1992","unstructured":"M. Rosenblum and J. Ousterhout, The design and implementation of a log-structured file system, ACM Transactions on Computer Systems, vol. 10(1), pp. 26\u201352, 1992.","journal-title":"ACM Transactions on Computer Systems"},{"key":"16_CR11","unstructured":"S. Tweedie, Journaling the Linux ext2fs filesystem, presented at the Fourth Annual Linux Expo (\n                    http:\/\/jamesthornton.com\/hotlist\/linuxfllesystems\/ext3-journal-design.pdf\n                    \n                  ), 1998."},{"key":"16_CR12","unstructured":"S. Tweedie, Ext3: Journaling filesystem (\n                    http:\/\/olstrans.sourceforge.net\/release\/OLS2000-ext3\/OLS2000-ext3.html\n                    \n                  ), July 20, 2000."},{"key":"16_CR13","unstructured":"U. Vahalia, C. Gray and D. Ting, Metadata logging in an NFS server, Proceedings of the USENIX Technical Conference on Unix and Advanced Computing Systems, pp. 265\u2013276, 1995."}],"container-title":["IFIP \u2014 The International Federation for Information Processing","Advances in Digital Forensics III"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73742-3_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T04:17:15Z","timestamp":1619669835000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73742-3_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387737416"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73742-3_16","relation":{},"subject":[]}}