{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:23:20Z","timestamp":1742991800515,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031565793"},{"type":"electronic","value":"9783031565809"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-56580-9_2","type":"book-chapter","created":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T05:02:23Z","timestamp":1712034143000},"page":"19-32","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Catch Me if\u00a0You Can: Analysis of\u00a0Digital Devices and Artifacts Used in\u00a0Murder Cases"],"prefix":"10.1007","author":[{"given":"John","family":"Jankura","sequence":"first","affiliation":[]},{"given":"Hannah","family":"Catallo-Stooks","sequence":"additional","affiliation":[]},{"given":"Ibrahim","family":"Baggili","sequence":"additional","affiliation":[]},{"given":"Golden","family":"Richard","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,3]]},"reference":[{"key":"2_CR1","unstructured":"About RCFL. https:\/\/www.rcfl.gov\/about"},{"key":"2_CR2","unstructured":"Best practices for the retrieval of video evidence from digital CCTV systems. [electronic resource]. Technical Support Working Group (2006). https:\/\/www.hsdl.org\/?view &did=747950"},{"key":"2_CR3","unstructured":"RCFL 2020 annual report (2020). https:\/\/www.rcfl.gov\/file-repository\/fy20-annual-report.pdf\/view"},{"key":"2_CR4","unstructured":"Mobile fact sheet (2021). https:\/\/www.pewresearch.org\/internet\/fact-sheet\/mobile\/"},{"key":"2_CR5","unstructured":"Al Mutawa, N., Al Awadhi, I., Baggili, I., Marrington, A.: Forensic artifacts of Facebook\u2019s instant messaging service. In: 2011 International Conference for Internet Technology and Secured Transactions, pp. 771\u2013776. IEEE (2011)"},{"key":"2_CR6","doi-asserted-by":"publisher","unstructured":"Al Mutawa, N., Baggili, I., Marrington, A.: Forensic analysis of social networking applications on mobile devices. Digit. Invest. 9, S24\u2013S33 (2012). https:\/\/doi.org\/10.1016\/j.diin.2012.05.007, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1742287612000321. The Proceedings of the Twelfth Annual DFRWS Conference","DOI":"10.1016\/j.diin.2012.05.007"},{"key":"2_CR7","doi-asserted-by":"publisher","unstructured":"Alyahya, T., Kausar, F.: Snapchat analysis to discover digital forensic artifacts on android smartphone. Procedia Comput. Sci. 109, 1035\u20131040 (2017). https:\/\/doi.org\/10.1016\/j.procs.2017.05.421, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1877050917311006. 8th International Conference on Ambient Systems, Networks and Technologies, ANT-2017 and the 7th International Conference on Sustainable Energy Information Technology, SEIT 2017, 16\u201319 May 2017, Madeira, Portugal","DOI":"10.1016\/j.procs.2017.05.421"},{"key":"2_CR8","unstructured":"Associated Press: \u2018fitbit\u2019 murder trial closing arguments heard in rockville court (2022). https:\/\/www.fox61.com\/article\/news\/crime\/dabate-fitbit-murder-trial-heads-to-closing-arguments\/520-38434662-d531-41c0-a0c5-f28b7a23bb33"},{"key":"2_CR9","doi-asserted-by":"publisher","unstructured":"Baggili, I., Oduro, J., Anthony, K., Breitinger, F., McGee, G.: Watch what you wear: preliminary forensic analysis of smart watches. In: 2015 10th International Conference on Availability, Reliability and Security, pp. 303\u2013311 (2015). https:\/\/doi.org\/10.1109\/ARES.2015.39","DOI":"10.1109\/ARES.2015.39"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Balon, T., Herlopian, K., Baggili, I., Grajeda-Mendez, C.: Forensic artifact finder (ForensicAF): an approach & tool for leveraging crowd-sourced curated forensic artifacts. In: The 16th International Conference on Availability, Reliability and Security, pp. 1\u201310 (2021)","DOI":"10.1145\/3465481.3470051"},{"key":"2_CR11","unstructured":"Bay City News: \u2018boogaloo\u2019 group members accused of deleting digital evidence related to law enforcement murders (2021). https:\/\/www.sfexaminer.com\/news\/boogaloo-group-members-accused-of-deleting-digital-evidence-related-to-law-enforcement-murders\/"},{"key":"2_CR12","doi-asserted-by":"publisher","unstructured":"Becirovic, S., Mrdovic, S.: Manual IoT forensics of a Samsung gear S3 frontier smartwatch. In: 2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), pp. 1\u20135 (2019). https:\/\/doi.org\/10.23919\/SOFTCOM.2019.8903845","DOI":"10.23919\/SOFTCOM.2019.8903845"},{"key":"2_CR13","doi-asserted-by":"publisher","first-page":"S13","DOI":"10.1016\/j.diin.2019.04.007","volume":"29","author":"P Casey","year":"2019","unstructured":"Casey, P., Lindsay-Decusati, R., Baggili, I., Breitinger, F.: Inception: virtual space in memory space in real space-memory forensics of immersive virtual reality with the HTC vive. Digit. Investig. 29, S13\u2013S21 (2019)","journal-title":"Digit. Investig."},{"key":"2_CR14","doi-asserted-by":"publisher","unstructured":"Dorai, G., Houshmand, S., Baggili, I.: I know what you did last summer: your smart home internet of things and your iPhone forensically ratting you out. In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018. Association for Computing Machinery, New York (2018). https:\/\/doi.org\/10.1145\/3230833.3232814","DOI":"10.1145\/3230833.3232814"},{"key":"2_CR15","unstructured":"Dwyer, C.: Arkansas prosecutors drop murder case that hinged on evidence from amazon echo (2017). https:\/\/www.npr.org\/sections\/thetwo-way\/2017\/11\/29\/567305812\/arkansas-prosecutors-drop-murder-case-that-hinged-on-evidence-from-amazon-echo"},{"key":"2_CR16","doi-asserted-by":"publisher","first-page":"S2","DOI":"10.1016\/j.diin.2009.06.016","volume":"6","author":"S Garfinkel","year":"2009","unstructured":"Garfinkel, S., Farrell, P., Roussev, V., Dinolt, G.: Bringing science to digital forensics with standardized forensic corpora. Digit. Invest. 6, S2\u2013S11 (2009)","journal-title":"Digit. Invest."},{"key":"2_CR17","doi-asserted-by":"publisher","unstructured":"Grajeda, C., Breitinger, F., Baggili, I.: Availability of datasets for digital forensics - and what is missing. Digit. Invest. 22, S94\u2013S105 (2017). https:\/\/doi.org\/10.1016\/j.diin.2017.06.004, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1742287617301913","DOI":"10.1016\/j.diin.2017.06.004"},{"key":"2_CR18","doi-asserted-by":"publisher","first-page":"S125","DOI":"10.1016\/j.diin.2016.04.005","volume":"18","author":"VS Harichandran","year":"2016","unstructured":"Harichandran, V.S., Walnycky, D., Baggili, I., Breitinger, F.: CuFA: a more formal definition for digital forensic artifacts. Digit. Invest. 18, S125\u2013S137 (2016)","journal-title":"Digit. Invest."},{"key":"2_CR19","doi-asserted-by":"publisher","unstructured":"Hassenfeldt, C., Baig, S., Baggili, I., Zhang, X.: Map my murder: a digital forensic study of mobile health and fitness applications. In: Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3339252.3340515","DOI":"10.1145\/3339252.3340515"},{"key":"2_CR20","doi-asserted-by":"publisher","unstructured":"Kapoor, A., Raza Qureshi, S.: Forensic analysis of digital evidence extracted from amazon echo. In: 2020 IEEE International Conference on Advent Trends in Multidisciplinary Research and Innovation (ICATMRI), pp. 1\u20137 (2020). https:\/\/doi.org\/10.1109\/ICATMRI51801.2020.9398391","DOI":"10.1109\/ICATMRI51801.2020.9398391"},{"key":"2_CR21","doi-asserted-by":"publisher","unstructured":"Luciano, L., Baggili, I., Topor, M., Casey, P., Breitinger, F.: Digital forensics in the next five years. In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018. Association for Computing Machinery, New York (2018). https:\/\/doi.org\/10.1145\/3230833.3232813","DOI":"10.1145\/3230833.3232813"},{"key":"2_CR22","unstructured":"Kennelly, M.F.: United states v. benford (2020). https:\/\/casetext.com\/case\/united-states-v-benford-19"},{"key":"2_CR23","first-page":"301187","volume":"37","author":"S McCullough","year":"2021","unstructured":"McCullough, S., Abudu, S., Onwubuariri, E., Baggili, I.: Another brick in the wall: an exploratory analysis of digital forensics programs in the united states. Forensic Sci. Int.: Digit. Invest. 37, 301187 (2021)","journal-title":"Forensic Sci. Int.: Digit. Invest."},{"key":"2_CR24","doi-asserted-by":"publisher","unstructured":"Montasari, R., Hill, R.: Next-generation digital forensics: challenges and future paradigms. In: 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3), pp. 205\u2013212 (2019). https:\/\/doi.org\/10.1109\/ICGS3.2019.8688020","DOI":"10.1109\/ICGS3.2019.8688020"},{"key":"2_CR25","doi-asserted-by":"publisher","unstructured":"Moore, J., Baggili, I., Breitinger, F.: Find me if you can: mobile GPS mapping applications forensic analysis & SNAVP the open source, modular, extensible parser. J. Digit. Forensics Secur. Law 12, 15 (2017). https:\/\/doi.org\/10.15394\/jdfsl.2017.1414","DOI":"10.15394\/jdfsl.2017.1414"},{"key":"2_CR26","doi-asserted-by":"publisher","unstructured":"Saleem, S., Baggili, I., Popov, O.: Quantifying relevance of mobile digital evidence as they relate to case types: a survey and a guide for best practices. J. Digit. Forensics Secur. Law 9 (2014). https:\/\/doi.org\/10.15394\/jdfsl.2014.1186","DOI":"10.15394\/jdfsl.2014.1186"},{"key":"2_CR27","unstructured":"Steiner, D., Lei, C., Hayes, D., Le-Khac, N.A.: Vehicle communication within networks - investigation and analysis approach: a case study. In: Proceedings of the Conference on Digital Forensics, Security & Law, pp. 1\u201316 (2019)"},{"key":"2_CR28","unstructured":"Wells, A.: Ping the admissibility of cellular records to track criminal defendants. Saint Louis Univ. Public Law Rev. 33(2) (2014)"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Yarramreddy, A., Gromkowski, P., Baggili, I.: Forensic analysis of immersive virtual reality social applications: a primary account. In: 2018 IEEE Security and Privacy Workshops (SPW), pp. 186\u2013196. IEEE (2018)","DOI":"10.1109\/SPW.2018.00034"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-56580-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T05:06:48Z","timestamp":1712034408000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-56580-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031565793","9783031565809"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-56580-9_2","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"3 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICDF2C","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Digital Forensics and Cyber Crime","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icdf2c2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"105","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}