{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T06:08:43Z","timestamp":1778047723891,"version":"3.51.4"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031069741","type":"print"},{"value":"9783031069758","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-06975-8_12","type":"book-chapter","created":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T23:03:42Z","timestamp":1654211022000},"page":"196-211","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Light-Weight File Fragments Classification Using Depthwise Separable Convolutions"],"prefix":"10.1007","author":[{"given":"Kunwar Muhammed","family":"Saaim","sequence":"first","affiliation":[]},{"given":"Muhamad","family":"Felemban","sequence":"additional","affiliation":[]},{"given":"Saleh","family":"Alsaleh","sequence":"additional","affiliation":[]},{"given":"Ahmad","family":"Almulhem","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,3]]},"reference":[{"key":"12_CR1","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-642-24212-0_5","volume-title":"Advances in Digital Forensics VII","author":"I Ahmed","year":"2011","unstructured":"Ahmed, I., Lhee, K.-S., Shin, H.-J., Hong, M.-P.: Fast content-based file type identification. In: Peterson, G., Shenoi, S. (eds.) DigitalForensics 2011. IAICT, vol. 361, pp. 65\u201375. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24212-0_5"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Akiba, T., Sano, S., Yanase, T., Ohta, T., Koyama, M.: Optuna: a next-generation hyperparameter optimization framework. In: Proceedings of the 25rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2019)","DOI":"10.1145\/3292500.3330701"},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/TSUSC.2019.2914192","volume":"6","author":"K Alghafli","year":"2019","unstructured":"Alghafli, K., Yeun, C.Y., Damiani, E.: Techniques for measuring the probability of adjacency between carved video fragments: the vidcarve approach. IEEE Trans. Sustain. Comput. 6, 131\u2013143 (2019)","journal-title":"IEEE Trans. Sustain. Comput."},{"key":"12_CR4","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1002\/sec.553","volume":"6","author":"MC Amirani","year":"2013","unstructured":"Amirani, M.C., Toorani, M., Mihandoost, S.: Feature-based type identification of file fragments. Secur. Commun. Netw. 6, 115\u2013128 (2013)","journal-title":"Secur. Commun. Netw."},{"issue":"9","key":"12_CR5","doi-asserted-by":"publisher","first-page":"1519","DOI":"10.1109\/TIFS.2013.2274728","volume":"8","author":"NL Beebe","year":"2013","unstructured":"Beebe, N.L., Maddox, L.A., Liu, L., Sun, M.: Sceadan: using concatenated n-gram vectors for improved file and data type classification. IEEE Trans. Inf. Forensics Secur. 8(9), 1519\u20131530 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"12_CR6","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1080\/19393555.2011.654317","volume":"21","author":"D Bennett","year":"2012","unstructured":"Bennett, D.: The challenges facing computer forensics investigators in obtaining information from mobile devices for use in criminal investigations. Inf. Secur. J. Global Perspect. 21(3), 159\u2013168 (2012)","journal-title":"Inf. Secur. J. Global Perspect."},{"key":"12_CR7","unstructured":"Bergstra, J.S., Bardenet, R., Bengio, Y., K\u00e9gl, B.: Algorithms for hyper-parameter optimization. In: Shawe-Taylor, J., Zemel, R.S., Bartlett, P.L., Pereira, F., Weinberger, K.Q. (eds.) Advances in Neural Information Processing Systems, vol. 24, pp. 2546\u20132554. Curran Associates, Inc. (2011). http:\/\/papers.nips.cc\/paper\/4443-algorithms-for-hyper-parameter-optimization.pdf"},{"key":"12_CR8","doi-asserted-by":"publisher","unstructured":"Chen, Q., et al.: File fragment classification using grayscale image conversion and deep learning in digital forensics. In: 2018 IEEE Security and Privacy Workshops (SPW) (2018). https:\/\/doi.org\/10.1109\/spw.2018.00029","DOI":"10.1109\/spw.2018.00029"},{"key":"12_CR9","doi-asserted-by":"publisher","unstructured":"Chollet, F.: Xception: deep learning with depthwise separable convolutions, pp. 1800\u20131807 (2017). https:\/\/doi.org\/10.1109\/CVPR.2017.195","DOI":"10.1109\/CVPR.2017.195"},{"key":"12_CR10","unstructured":"Darwin, I.F.: Libmagic (2008). ftp:\/\/ftp.astron.com\/pub\/file"},{"key":"12_CR11","unstructured":"Dunne, R.A., Campbell, N.A.: On the pairing of the softmax activation and cross-entropy penalty functions and the derivation of the softmax activation function. In: Proceedings of 8th Australian Conference on the Neural Networks, Melbourne, vol. 181, p. 185. Citeseer (1997)"},{"key":"12_CR12","doi-asserted-by":"publisher","unstructured":"Fitzgerald, S., Mathews, G., Morris, C., Zhulyn, O.: Using nlp techniques for file fragment classification. Digital Invest. 9 (2012). https:\/\/doi.org\/10.1016\/j.diin.2012.05.008","DOI":"10.1016\/j.diin.2012.05.008"},{"key":"12_CR13","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/BF00344251","volume":"36","author":"K Fukushima","year":"1980","unstructured":"Fukushima, K.: A self-organizing neural network model for a mechanism of pattern recognition unaffected by shift in position. Biol. Cybern. 36, 193\u2013202 (1980)","journal-title":"Biol. Cybern."},{"key":"12_CR14","doi-asserted-by":"publisher","unstructured":"Garfinkel, S., Farrell, P., Roussev, V., Dinolt, G.: Bringing science to digital forensics with standardized forensic corpora. Digital Invest. 6 (2009). https:\/\/doi.org\/10.1016\/j.diin.2009.06.016","DOI":"10.1016\/j.diin.2009.06.016"},{"key":"12_CR15","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.diin.2007.06.017","volume":"4","author":"SL Garfinkel","year":"2007","unstructured":"Garfinkel, S.L.: Carving contiguous and fragmented files with fast object validation. Digital Invest. 4, 2\u201312 (2007)","journal-title":"Digital Invest."},{"key":"12_CR16","unstructured":"Hiester, L.: File fragment classification using neural networks with lossless representations (2018)"},{"key":"12_CR17","unstructured":"Hinton, G., Vinyals, O., Dean, J.: Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531 (2015)"},{"issue":"02","key":"12_CR18","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1142\/S0218488598000094","volume":"6","author":"S Hochreiter","year":"1998","unstructured":"Hochreiter, S.: The vanishing gradient problem during learning recurrent neural nets and problem solutions. Int. J. Uncertainty Fuzz. Knowl.-Based Syst. 6(02), 107\u2013116 (1998)","journal-title":"Int. J. Uncertainty Fuzz. Knowl.-Based Syst."},{"issue":"8","key":"12_CR19","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Howard, A., et al.: Searching for mobilenetv3. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 1314\u20131324 (2019)","DOI":"10.1109\/ICCV.2019.00140"},{"key":"12_CR21","unstructured":"Howard, A., et al.: Mobilenets: efficient convolutional neural networks for mobile vision applications (2017)"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Karresand, M., Shahmehri, N.: Oscar - file type identification of binary data in disk clusters and ram pages. In: SEC (2006)","DOI":"10.1007\/0-387-33406-8_35"},{"key":"12_CR23","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"},{"key":"12_CR24","unstructured":"Lei, Z.: Forensic analysis of unallocated space. Ph.D. thesis, UOIT (2011)"},{"key":"12_CR25","unstructured":"Li, Q., Ong, A., Suganthan, P., Thing, V.: A novel support vector machine approach to high entropy data fragment classification (2010)"},{"key":"12_CR26","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-030-00581-8_9","volume-title":"Introductory Computer Forensics","author":"X Lin","year":"2018","unstructured":"Lin, X.: File carving. In: Introductory Computer Forensics, pp. 211\u2013233. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00581-8_9"},{"key":"12_CR27","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.diin.2007.06.014","volume":"4","author":"L Marziale","year":"2007","unstructured":"Marziale, L., Richard, G.G., III., Roussev, V.: Massive threading: using gpus to increase the performance of digital forensics tools. Digital Invest. 4, 73\u201381 (2007)","journal-title":"Digital Invest."},{"key":"12_CR28","doi-asserted-by":"publisher","unstructured":"Memon, G.M.P.K.N.: File fragment type (fft) - 75 dataset (2019). https:\/\/doi.org\/10.21227\/kfxw-8084","DOI":"10.21227\/kfxw-8084"},{"key":"12_CR29","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/TIFS.2020.3004266","volume":"16","author":"G Mittal","year":"2020","unstructured":"Mittal, G., Korus, P., Memon, N.: Fifty: large-scale file fragment type identification using convolutional neural networks. IEEE Trans. Inf. Forensics Secur. 16, 28\u201341 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"12_CR30","unstructured":"Pham, H., Guan, M.Y., Zoph, B., Le, Q.V., Dean, J.: Efficient neural architecture search via parameter sharing. arXiv preprint arXiv:1802.03268 (2018)"},{"key":"12_CR31","unstructured":"Pratt, L.Y.: Discriminability-based transfer between neural networks. In: Advances in Neural Information Processing Systems, pp. 204\u2013211 (1993)"},{"issue":"10","key":"12_CR32","first-page":"1048","volume":"4","author":"M Rafique","year":"2013","unstructured":"Rafique, M., Khan, M.: Exploring static and live digital forensics: methods, practices and tools. Int. J. Sci. Eng. Res. 4(10), 1048\u20131056 (2013)","journal-title":"Int. J. Sci. Eng. Res."},{"key":"12_CR33","unstructured":"Richard III, G.G., Roussev, V.: Scalpel: A frugal, high performance file carver. In: DFRWS. Citeseer (2005)"},{"key":"12_CR34","unstructured":"SIfre, L., Mallat, S.: Rigid-motion scattering for texture classification (2014)"},{"key":"12_CR35","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. CoRR abs\/1409.1556 (2014). http:\/\/arxiv.org\/abs\/1409.1556"},{"key":"12_CR36","doi-asserted-by":"crossref","unstructured":"Szegedy, C., et al.: Going deeper with convolutions. In: Computer Vision and Pattern Recognition (CVPR) (2015). http:\/\/arxiv.org\/abs\/1409.4842","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"12_CR37","unstructured":"Tan, M., Le, Q.V.: Efficientnet: rethinking model scaling for convolutional neural networks. arXiv preprint arXiv:1905.11946 (2019)"},{"key":"12_CR38","unstructured":"Tian, Y., Krishnan, D., Isola, P.: Contrastive representation distillation. arXiv preprint arXiv:1910.10699 (2019)"},{"key":"12_CR39","doi-asserted-by":"crossref","unstructured":"Vulinovi\u0107, K., Ivkovi\u0107, L., Petrovi\u0107, J., Skra\u010di\u0107, K., Pale, P.: Neural networks for file fragment classification. In: 2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 1194\u20131198. IEEE (2019)","DOI":"10.23919\/MIPRO.2019.8756878"},{"issue":"4","key":"12_CR40","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/103085.103089","volume":"34","author":"GK Wallace","year":"1991","unstructured":"Wallace, G.K.: The jpeg still picture compression standard. Commun. ACM 34(4), 30\u201344 (1991). https:\/\/doi.org\/10.1145\/103085.103089","journal-title":"Commun. ACM"},{"issue":"10","key":"12_CR41","doi-asserted-by":"publisher","first-page":"2553","DOI":"10.1109\/TIFS.2018.2823697","volume":"13","author":"F Wang","year":"2018","unstructured":"Wang, F., Quach, T.T., Wheeler, J., Aimone, J.B., James, C.D.: Sparse coding for n-gram feature extraction and training for file fragment classification. IEEE Trans. Inf. Forensics Secur. 13(10), 2553\u20132562 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"12_CR42","doi-asserted-by":"publisher","unstructured":"Wang, Y., Su, Z., Song, D.: File fragment type identification with convolutional neural networks. Proceedings of the 2018 International Conference on Machine Learning Technologies - ICMLT 18 (2018). https:\/\/doi.org\/10.1145\/3231884.3231889","DOI":"10.1145\/3231884.3231889"},{"key":"12_CR43","doi-asserted-by":"crossref","unstructured":"Zheng, N., Wang, J., Wu, T., Xu, M.: A fragment classification method depending on data type. 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, pp. 1948\u20131953 (2015)","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.288"},{"key":"12_CR44","doi-asserted-by":"crossref","unstructured":"Zoph, B., Vasudevan, V., Shlens, J., Le, Q.V.: Learning transferable architectures for scalable image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 8697\u20138710 (2018)","DOI":"10.1109\/CVPR.2018.00907"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-06975-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T23:07:05Z","timestamp":1654211225000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-06975-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031069741","9783031069758"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-06975-8_12","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"3 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"37","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ifipsec2022.compute.dtu.dk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"127","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}