{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T18:35:44Z","timestamp":1725993344104},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030009151"},{"type":"electronic","value":"9783030009168"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00916-8_51","type":"book-chapter","created":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T07:45:33Z","timestamp":1537861533000},"page":"554-566","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Adaptive Carving Method for Live FLV Streaming"],"prefix":"10.1007","author":[{"given":"Haidong","family":"Ge","sequence":"first","affiliation":[]},{"given":"Ning","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Tong","family":"Qiao","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jinkai","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Sudeng","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,26]]},"reference":[{"key":"51_CR1","doi-asserted-by":"crossref","unstructured":"Zhu, X., Chen, C.W.: A joint source-channel adaptive scheme for wireless H.264 video authentication. In: IEEE International Conference on Multimedia and Expo, pp. 13\u201318 (2010)","DOI":"10.1109\/ICME.2010.5583005"},{"key":"51_CR2","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.comnet.2017.03.019","volume":"119","author":"YN Dong","year":"2017","unstructured":"Dong, Y.N., Zhao, J.J., Jin, J.: Novel feature selection and classification of internet video traffic based on a hierarchical scheme. Comput. Netw. 119, 102\u2013111 (2017)","journal-title":"Comput. Netw."},{"key":"51_CR3","doi-asserted-by":"crossref","unstructured":"Li, J., Bhattacharyya, R., Paul, S., Shakkottai, S.: Incentivizing sharing in realtime D2D streaming networks: a mean field game perspective. In: Computer Communications, pp. 2119\u20132127 (2016)","DOI":"10.1109\/INFOCOM.2015.7218597"},{"issue":"1","key":"51_CR4","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s11042-012-1344-1","volume":"72","author":"F Espina","year":"2014","unstructured":"Espina, F., Morato, D., Izal, M., Maga\u00f1a, E.: Analytical model for MPEG video frame loss rates and playback interruptions on packet networks. Multimed. Tools Appl. 72(1), 361\u2013383 (2014)","journal-title":"Multimed. Tools Appl."},{"issue":"2","key":"51_CR5","first-page":"517","volume":"23","author":"GH Na","year":"2014","unstructured":"Na, G.H., Shim, K.S., Moon, K.W., Kong, S.G., Kim, E.S., Lee, J.: Frame-based recovery of corrupted video files using video codec specifications. IEEE Trans. Image Process. Publ. IEEE Signal Process. Soc. 23(2), 517\u201326 (2014)","journal-title":"IEEE Trans. Image Process. Publ. IEEE Signal Process. Soc."},{"issue":"C","key":"51_CR6","first-page":"217","volume":"102","author":"X Zheng","year":"2015","unstructured":"Zheng, X., Liu, Y., Mei, L., Chuanping, H., Chen, L.: Semantic based representing and organizing surveillance big data using video structural description technology. J. Syst. Softw. 102(C), 217\u2013225 (2015)","journal-title":"J. Syst. Softw."},{"issue":"8","key":"51_CR7","doi-asserted-by":"publisher","first-page":"1549","DOI":"10.1109\/TIFS.2015.2416685","volume":"10","author":"E Uzun","year":"2015","unstructured":"Uzun, E., Sencar, H.T.: Carving orphaned JPEG file fragments. IEEE Trans. Inf. Forensics Secur. 10(8), 1549\u20131563 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"51_CR8","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/TIFS.2014.2362848","volume":"10","author":"S Chen","year":"2015","unstructured":"Chen, S., Pande, A., Zeng, K., Mohapatra, P.: Live video forensics: source identification in lossy wireless networks. IEEE Trans. Inf. Forensics Secur. 10(1), 28\u201339 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"51_CR9","unstructured":"Laing, S., Locasto, M.E., Aycock, J.: An experience report on extracting and viewing memory events via Wireshark. In: USENIX Conference on Offensive Technologies (2014)"},{"key":"51_CR10","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.comcom.2016.08.005","volume":"99","author":"T Wu","year":"2016","unstructured":"Wu, T., Petrangeli, S., Huysegems, R., Bostoen, T., De Turck, F.: Network-based video freeze detection and prediction in HTTP adaptive streaming. Comput. Commun. 99, 37\u201347 (2016)","journal-title":"Comput. Commun."},{"key":"51_CR11","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-319-25512-5_6","volume-title":"Digital Forensics and Cyber Crime","author":"P Matou\u0161ek","year":"2015","unstructured":"Matou\u0161ek, P., et al.: Advanced techniques for reconstruction of incomplete network data. In: James, J.I., Breitinger, F. (eds.) ICDF2C 2015. LNICST, vol. 157, pp. 69\u201384. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-25512-5_6"},{"issue":"4","key":"51_CR12","doi-asserted-by":"publisher","first-page":"1975","DOI":"10.1109\/TNET.2015.2448550","volume":"24","author":"J Ning","year":"2016","unstructured":"Ning, J., Singh, S., Pelechrinis, K., Liu, B., Krishnamurthy, S.V., Govindan, R.: Forensic analysis of packet losses in wireless networks. IEEE\/ACM Trans. Netw. 24(4), 1975\u20131988 (2016)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"2","key":"51_CR13","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.diin.2006.04.004","volume":"3","author":"P Sommer","year":"2006","unstructured":"Sommer, P.: File system forensic analysis, B. carrier. Addison Wesley, ISBN 0-321-26817-2. Digit. Investig. 3(2), 103 (2006)","journal-title":"Digit. Investig."},{"key":"51_CR14","unstructured":"Richard III, G.G., Roussev, V.: Scalpel: a frugal, high performance file carver. In: Refereed Proceedings of the Digital Forensic Research Workshop, DFRWS 2005, Astor Crowne Plaza, New Orleans, Louisiana, USA, August 2005"},{"issue":"2","key":"51_CR15","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/MSP.2008.931081","volume":"26","author":"A Pal","year":"2009","unstructured":"Pal, A., Memon, N.: The evolution of file carving. IEEE Signal Process. Mag. 26(2), 59\u201371 (2009)","journal-title":"IEEE Signal Process. Mag."},{"issue":"3","key":"51_CR16","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.diin.2014.06.001","volume":"11","author":"J Park","year":"2014","unstructured":"Park, J., Lee, S.: Data fragment forensics for embedded DVR systems. Digit. Investig. 11(3), 187\u2013200 (2014)","journal-title":"Digit. Investig."},{"key":"51_CR17","doi-asserted-by":"publisher","first-page":"3293","DOI":"10.1007\/s11042-016-3716-4","volume":"76","author":"Y Yang","year":"2016","unstructured":"Yang, Y., Zheng, X., Liu, L., Sun, G.: A security carving approach for AVI video based on frame size and index. Multimedia Tools Appl. 76, 3293\u20133312 (2016)","journal-title":"Multimedia Tools Appl."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Collaborative Computing: Networking, Applications and Worksharing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00916-8_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T20:19:36Z","timestamp":1571948376000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00916-8_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030009151","9783030009168"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00916-8_51","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"CollaborateCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Collaborative Computing: Networking, Applications and Worksharing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Edinburgh","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"colcom2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/collaboratecom.eai-conferences.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}