{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:48:22Z","timestamp":1742914102141,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030562229"},{"type":"electronic","value":"9783030562236"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-56223-6_8","type":"book-chapter","created":{"date-parts":[[2020,9,6]],"date-time":"2020-09-06T15:03:24Z","timestamp":1599404604000},"page":"137-157","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Resident Data Pattern Analysis Using Sector Clustering for Storage Drive Forensics"],"prefix":"10.1007","author":[{"given":"Nitesh","family":"Bharadwaj","sequence":"first","affiliation":[]},{"given":"Upasna","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Gaurav","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,6]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"N. Beebe, Digital forensic research: The good, the bad and the unaddressed, in Advances in Digital Forensics V, G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 17\u201336, 2009.","DOI":"10.1007\/978-3-642-04155-6_2"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"N. Beebe and J. Clark, Dealing with terabyte data sets in digital investigations, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 3\u201316, 2006.","DOI":"10.1007\/0-387-31163-7_1"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"N. Bharadwaj and U. Singh, Efficiently searching for target data traces in storage devices with region-based random sector sampling, Digital Investigation, vol. 24, pp. 128\u2013141, 2018.","DOI":"10.1016\/j.diin.2018.02.004"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"N. Bharadwaj and U. Singh, Significant data region identification and analysis using $$k$$-means in large storage drive forensics, Security and Privacy, vol. 1(4), paper no. e40, 2018.","DOI":"10.1002\/spy2.40"},{"key":"8_CR5","unstructured":"N. Canceill, Random Sampling Applied to Rapid Disk Analysis, Master\u2019s Research Project Report, Department of System and Network Engineering, University of Amsterdam, Amsterdam, The Netherlands, 2013."},{"key":"8_CR6","unstructured":"W. Cochran, Sampling Techniques, John Wiley and Sons, New York, 1977."},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"S. Garfinkel, Digital forensics research: The next 10 years, Digital Investigation, vol. 7(S), pp. S64\u2013S73, 2010.","DOI":"10.1016\/j.diin.2010.05.009"},{"key":"8_CR8","unstructured":"S. Garfinkel, Fast disk analysis with random sampling, presented at the Annual CENIC Conference, 2010."},{"key":"8_CR9","unstructured":"G. Israel, Determining Sample Size, Fact Sheet PEOD-6, Florida Cooperative Extension Service, University of Florida, Gainesville, Florida, 1992."},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"B. Jones, S. Pleno and M. Wilkinson, The use of random sampling in investigations involving child abuse material, Digital Investigation, vol. 9(S), pp. S99\u2013S107, 2012.","DOI":"10.1016\/j.diin.2012.05.011"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"R. Lyda and J. Hamrock, Using entropy analysis to find encrypted and packed malware, IEEE Security and Privacy, vol. 5(2), pp. 40\u201345, 2007.","DOI":"10.1109\/MSP.2007.48"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"D. Quick and K. Choo, Data reduction and data mining framework for digital forensic evidence: Storage, intelligence, review and archival, Trends and Issues in Crime and Criminal Justice, no. 480, 2014.","DOI":"10.52922\/ti180697"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"D. Quick and K. Choo, Impacts of the increasing volume of digital forensic data: A survey and future research challenges, Digital Investigation, vol. 11(4), pp. 273\u2013294, 2014.","DOI":"10.1016\/j.diin.2014.09.002"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"D. Quick and K. Choo, Big forensic data reduction: Digital forensic images and electronic evidence, Cluster Computing, vol. 19(2), pp. 723\u2013740, 2016.","DOI":"10.1007\/s10586-016-0553-1"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"G. Richard and V. Roussev, Next-generation digital forensics, Communications of the ACM, vol. 49(2), pp. 76\u201380, 2006.","DOI":"10.1145\/1113034.1113074"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"V. Roussev and C. Quates, Content triage with similarity digests: The M57 case study, Digital Investigation, vol. 9(S), pp. S60\u2013S68, 2012.","DOI":"10.1016\/j.diin.2012.05.012"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"V. Roussev, C. Quates and R. Martell, Real-time digital forensics and triage, Digital Investigation, vol. 10(2), pp. 158\u2013167, 2013.","DOI":"10.1016\/j.diin.2013.02.001"},{"key":"8_CR18","unstructured":"scikit-learn, Machine learning in Python (scikit-learn.org), 2019."},{"key":"8_CR19","unstructured":"M. Shannon, Forensic relative strength scoring: ASCII and entropy scoring, International Journal of Digital Evidence, vol. 2(4), 2004."},{"key":"8_CR20","unstructured":"A. Singh and M Masuku, Sampling techniques and determination of sample size in applied statistics research: An overview, International Journal of Economics, Commerce and Management, vol. II(11), 2014."},{"key":"8_CR21","unstructured":"J. Taguchi, Optimal Sector Sampling for Drive Triage, M.S. Thesis, Department of Computer Science, Naval Postgraduate School, Monterey, California, 2013."},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"R. Verma, J. Govindaraj and G. Gupta, Data privacy perceptions about digital forensic investigations in India, in Advances in Digital Forensics XII, G. Peterson and S. Shenoi (Eds.), Springer, Cham, Switzerland, pp. 25\u201345, 2016.","DOI":"10.1007\/978-3-319-46279-0_2"},{"key":"8_CR23","unstructured":"R. Verma, J. Govindaraj and G. Gupta, DF 2.0: Designing an automated, privacy preserving and efficient digital forensic framework, Proceedings of the Annual ADFSL Conference on Digital Forensics, Security and Law, pp. 127\u2013150, 2018."},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"J. Young, K. Foster, S. Garfinkel and K. Fairbanks, Distinct sector hashes for target file detection, IEEE Computer, vol. 45(12), pp. 28\u201335, 2012.","DOI":"10.1109\/MC.2012.327"}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics XVI"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-56223-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T00:03:45Z","timestamp":1725581025000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-56223-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030562229","9783030562236"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-56223-6_8","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"6 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DigitalForensics","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Digital Forensics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New Delhi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 January 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 January 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"digitalforensics2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ifip119.org\/Conferences\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}