{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T22:24:24Z","timestamp":1725834264837},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319250151"},{"type":"electronic","value":"9783319250175"}],"license":[{"start":{"date-parts":[[2015,10,18]],"date-time":"2015-10-18T00:00:00Z","timestamp":1445126400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-25017-5_42","type":"book-chapter","created":{"date-parts":[[2015,10,18]],"date-time":"2015-10-18T23:39:25Z","timestamp":1445211565000},"page":"451-457","source":"Crossref","is-referenced-by-count":2,"title":["Forensic Data Analysis Challenges in Large Scale Systems"],"prefix":"10.1007","author":[{"given":"Damien","family":"Conroy","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,18]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Afzaal, M., Di\u00a0Sarno, C., Coppolino, L., D\u2019Antonio, S., Romano, L.: A resilient architecture for forensic storage of events in critical infrastructures. In: 2012 IEEE 14th International Symposium on High-Assurance Systems Engineering (HASE), pp. 48\u201355. IEEE, (2012)","key":"42_CR1","DOI":"10.1109\/HASE.2012.9"},{"unstructured":"Alqahtany, S., Clarke, N., Furnell, S., Reich, C.: A forensically-enabled iaas cloud computing architecture. In: Australian Digital Forensics Conference (2014)","key":"42_CR2"},{"unstructured":"Basnight, Z., Butts, J., Lopez, J., Dube, T.: Analysis of programmable logic controller firmware for threat assessment and forensic investigation. In: Proceedings of the 8th International Conference on Information Warfare and Security: ICIW 2013, pp. 9. Academic Conferences Limited, (2013)","key":"42_CR3"},{"unstructured":"Campanile, F., Cilardo, A., Coppolino, L., Romano, L.: Adaptable parsing of real-time data streams. In: 15th EUROMICRO International Conference on Parallel, Distributed and Network-Based Processing, PDP\u201907, pp. 412\u2013418. IEEE, (2007)","key":"42_CR4"},{"issue":"6","key":"42_CR5","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MSP.2013.138","volume":"11","author":"AA C\u00e1rdenas","year":"2013","unstructured":"C\u00e1rdenas, A.A., Manadhata, P.K., Rajan, S.P.: Big data analytics for security. IEEE Secur. Priv. 11(6), 74\u201376 (2013)","journal-title":"IEEE Secur. Priv."},{"unstructured":"Ficco, M., Romano, L.: A generic intrusion detection and diagnoser system based on complex event processing. In: 2011 First International Conference on Data Compression, Communications and Processing (CCP), pp. 275\u2013284, (2011)","key":"42_CR6"},{"unstructured":"E.: ediscovery reference model. \n                    http:\/\/www.edrm.net\n                    \n                   (2014)","key":"42_CR7"},{"unstructured":"E.: A situation aware security operations centre. \n                    http:\/\/www.sawsoc.eu\n                    \n                   (2015)","key":"42_CR8"},{"unstructured":"Krasser, S., Conti, G., Grizzard, J., Gribschaw, J., Owen, H.: Real-time and forensic network data analysis using animated and coordinated visualization. In: Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, 2005. IAW\u201905, pp. 42\u201349. IEEE, (2005)","key":"42_CR9"},{"unstructured":"Mahmood, T., Afzal, U.: Security analytics: big data analytics for cybersecurity: a review of trends, techniques and tools. In: 2013 2nd National Conference on Information Assurance (NCIA), pp. 129\u2013134. IEEE, (2013)","key":"42_CR10"},{"issue":"4","key":"42_CR11","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/2627534.2627561","volume":"41","author":"O Savas","year":"2014","unstructured":"Savas, O., Sagduyu, Y., Deng, J., Li, J.: Tactical big data analytics: challenges, use cases, and solutions. ACM SIGMETRICS Perform. Eval. Rev. 41(4), 86\u201389 (2014)","journal-title":"ACM SIGMETRICS Perform. Eval. Rev."},{"unstructured":"Yu, E., Lapouchnian, A.: Architecting the enterprise to leverage a confluence of emerging technologies. In: Proceedings of the 2013 Conference of the Center for Advanced Studies on Collaborative Research, pp. 408\u2013414. IBM Corp. (2013)","key":"42_CR12"}],"container-title":["Studies in Computational Intelligence","Intelligent Distributed Computing IX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25017-5_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T07:31:06Z","timestamp":1559287866000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25017-5_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,18]]},"ISBN":["9783319250151","9783319250175"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25017-5_42","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2015,10,18]]}}}