{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T05:34:42Z","timestamp":1761197682569,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030223502"},{"type":"electronic","value":"9783030223519"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-22351-9_19","type":"book-chapter","created":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T23:33:30Z","timestamp":1562715210000},"page":"277-293","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Investigating Visualisation Techniques for Rapid Triage of Digital Forensic Evidence"],"prefix":"10.1007","author":[{"given":"Gavin","family":"Hales","sequence":"first","affiliation":[]},{"given":"Ethan","family":"Bayne","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,12]]},"reference":[{"key":"19_CR1","unstructured":"OFCOM: Decade of Digital Dependency (2018). https:\/\/www.ofcom.org.uk\/about-ofcom\/latest\/features-and-news\/decade-of-digital-dependency"},{"key":"19_CR2","first-page":"21","volume":"36","author":"SJ Vaughan-Nichols","year":"2003","unstructured":"Vaughan-Nichols, S.J.: Hard drive technology reaches a turning point. Computer 36, 21\u201323 (2003). Long. Beach. Calif)","journal-title":"Computer"},{"key":"19_CR3","unstructured":"Farrance, R.: Timeline: 50 Years of Hard Drives (2006). https:\/\/www.pcworld.com\/article\/127105\/article.html"},{"key":"19_CR4","unstructured":"Mah Ung, G.: Seagate\u2019s 10\u00a0TB Barracuda Pro is the world\u2019s largest consumer hard drive (2016). https:\/\/www.pcworld.com\/article\/3096292\/storage\/seagates-10tb-barracuda-pro-is-the-worlds-largest-consumer-hard-drive.html"},{"key":"19_CR5","unstructured":"Her Majesty\u2019s Inspectorate of Constabulary: Online and on the edge: Real risks in a virtual world (2015)"},{"key":"19_CR6","unstructured":"Palmer, G.: A road map for digital forensic research. In: First Digital Forensic Research Workshop, Utica, New York, pp. 27\u201330 (2001)"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Hales, G.: Visualisation of device datasets to assist digital forensic investigation. In: 2017 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA), IEEE (2017)","DOI":"10.1109\/CyberSA.2017.8073402"},{"key":"19_CR8","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1109\/TVCG.2018.2865028","volume":"25","author":"M Angelini","year":"2019","unstructured":"Angelini, M., Blasilli, G., Catarci, T., Lenti, S., Santucci, G.: Vulnus: visual vulnerability analysis for network security. IEEE Trans. Vis. Comput. Graph. 25, 183\u2013192 (2019)","journal-title":"IEEE Trans. Vis. Comput. Graph."},{"key":"19_CR9","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-662-47401-3_12","volume-title":"Trustworthy Computing and Services","author":"X Liu","year":"2015","unstructured":"Liu, X., Sun, Y., Fang, L., Liu, J., Yu, L.: A survey of network traffic visualization in detecting network security threats. In: Lu, Y., Wu, X., Zhang, X. (eds.) ISCTCS 2014. CCIS, vol. 520, pp. 91\u201398. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-47401-3_12"},{"key":"19_CR10","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1109\/MSP.2015.2507185","volume":"33","author":"L Nataraj","year":"2016","unstructured":"Nataraj, L., Manjunath, B.S.: SPAM: signal processing to analyze malware [Applications Corner]. IEEE Signal Process. Mag. 33, 105\u2013117 (2016)","journal-title":"IEEE Signal Process. Mag."},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Quist, D.A., Liebrock, L.M.: Visualizing compiled executables for malware analysis. In: 2009 6th International Workshop on Visualization for Cyber Security, pp. 27\u201332. IEEE (2009)","DOI":"10.1109\/VIZSEC.2009.5375539"},{"key":"19_CR12","doi-asserted-by":"publisher","first-page":"S29","DOI":"10.1016\/j.diin.2018.01.005","volume":"24","author":"E Bayne","year":"2018","unstructured":"Bayne, E., Ferguson, R.I., Sampson, A.T.: OpenForensics: a digital forensics GPU pattern matching approach for the 21st century. Digital Invest. 24, S29\u2013S37 (2018)","journal-title":"Digital Invest."},{"key":"19_CR13","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/j.neucom.2016.12.017","volume":"230","author":"M Perez","year":"2017","unstructured":"Perez, M., et al.: Video pornography detection through deep learning techniques and motion information. Neurocomputing 230, 279\u2013293 (2017)","journal-title":"Neurocomputing"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Platzer, C., Stuetz, M., Lindorfer, M.: Skin sheriff. In: Proceedings of the 2nd International Workshop on Security and Forensics in Communication Systems - SFCS 2014, pp. 45\u201356. ACM Press, New York (2014)","DOI":"10.1145\/2598918.2598920"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Mayer, F., Steinebach, M.: Forensic image inspection assisted by deep learning. In: Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES 2017, pp. 1\u20139. ACM Press, New York (2017)","DOI":"10.1145\/3098954.3104051"},{"key":"19_CR16","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1126\/science.1145183","volume":"187","author":"MC Potter","year":"1975","unstructured":"Potter, M.C.: Meaning in visual search. Science 187, 965\u2013966 (1975)","journal-title":"Science"}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22351-9_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T00:26:42Z","timestamp":1689726402000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-22351-9_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030223502","9783030223519"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22351-9_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"12 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Orlando, FL","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2019.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}