{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:01:28Z","timestamp":1725494488862},"publisher-location":"Boston, MA","reference-count":4,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387754611"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-75462-8_16","type":"book-chapter","created":{"date-parts":[[2007,11,6]],"date-time":"2007-11-06T23:53:00Z","timestamp":1194393180000},"page":"223-235","source":"Crossref","is-referenced-by-count":5,"title":["Remote Forensic Analysis of Process Control Systems"],"prefix":"10.1007","author":[{"given":"Regis Friend","family":"Cassidy","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Adrian","family":"Chavez","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jason","family":"Trent","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jorge","family":"Urrea","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"16_CR1_","unstructured":"Guidance Software, EnCase Enterprise (\n                    www.guidancesoftware. com\/products\/ee index. asp\n                    \n                  ), 2006."},{"key":"16_CR2_","unstructured":"Guidance Software, How it works - EnCase Enterprise (\n                    www.guidance software. com\/products\/ee HowItWorks. asp\n                    \n                  ), 2006."},{"issue":"5","key":"16_CR3_","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/MSP.2005.136","volume":"3","author":"A Miller","year":"2005","unstructured":"A. Miller, Trends in process control systems security, IEEE Security and Privacy, vol. 3(5), pp. 57-60, 2005.","journal-title":"IEEE Security and Privacy"},{"key":"16_CR4_","unstructured":"Office of Homeland Security, The National Strategy for Homeland Secu- rity, The White House, Washington, DC (\n                    www.\n                    \n                   whitehouse), 2002."}],"container-title":["IFIP International Federation for Information Processing","Critical Infrastructure Protection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-75462-8_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T03:51:25Z","timestamp":1619668285000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-75462-8_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387754611"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-75462-8_16","relation":{},"subject":[]}}