{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:00:11Z","timestamp":1725868811799},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319480565"},{"type":"electronic","value":"9783319480572"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48057-2_15","type":"book-chapter","created":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T04:37:01Z","timestamp":1477111021000},"page":"209-216","source":"Crossref","is-referenced-by-count":0,"title":["Using Graph Database for Evidence Correlation on Android Smartphones"],"prefix":"10.1007","author":[{"given":"Minh-Tuan","family":"Dang","sequence":"first","affiliation":[]},{"given":"Tuan A.","family":"Nguyen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,23]]},"reference":[{"issue":"1","key":"15_CR1","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1145\/1322432.1322433","volume":"40","author":"R Angles","year":"2008","unstructured":"Angles, R., Gutierrez, C.: Survey of graph database models. ACM Comput. Surv. (CSUR) 40(1), 11\u2013139 (2008)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"4","key":"15_CR2","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1016\/j.diin.2013.10.003","volume":"10","author":"K Barmpatsalou","year":"2013","unstructured":"Barmpatsalou, K., Damopoulos, D., Kambourakis, G., Katos, V.: A critical review of 7 years of mobile device forensics. Digit. Investig. 10(4), 323\u2013349 (2013)","journal-title":"Digit. Investig."},{"key":"15_CR3","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/B978-0-12-804526-8.00005-8","volume-title":"Digital Forensics","author":"J Brunty","year":"2016","unstructured":"Brunty, J.: Mobile device forensics: threats, challenges, and future trends. In: Sammons, J. (ed.) Digital Forensics, pp. 69\u201384. Syngress, Burlington (2016). Chapter 5"},{"key":"15_CR4","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/B978-0-12-407192-6.00003-0","volume-title":"Joe Celkos Complete Guide to NoSQL","author":"J Celko","year":"2014","unstructured":"Celko, J.: Graph databases. In: Celko, J. (ed.) Joe Celkos Complete Guide to NoSQL, pp. 27\u201346. Morgan Kaufmann, Burlington (2014). Chapter 3"},{"key":"15_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cose.2015.10.007","volume":"57","author":"VS Harichandran","year":"2016","unstructured":"Harichandran, V.S., Breitinger, F., Baggili, I., Marrington, A.: A cyber forensics needs analysis survey: revisiting the domain\u2019s needs a decade later. Comput. Secur. 57, 1\u201313 (2016)","journal-title":"Comput. Secur."},{"key":"15_CR6","volume-title":"Android Forensics: Investigation, Analysis and Mobile Security for Google Android","author":"A Hoog","year":"2011","unstructured":"Hoog, A.: Android Forensics: Investigation, Analysis and Mobile Security for Google Android, 1st edn. Syngress Publishing, Burlington (2011)","edition":"1"},{"key":"15_CR7","volume-title":"iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices","author":"A Hoog","year":"2011","unstructured":"Hoog, A., Strzempka, K.: iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices, 1st edn. Syngress Publishing, Burlington (2011)","edition":"1"},{"issue":"Suppl.","key":"15_CR8","doi-asserted-by":"crossref","first-page":"S24","DOI":"10.1016\/j.diin.2012.05.007","volume":"9","author":"NA Mutawa","year":"2012","unstructured":"Mutawa, N.A., Baggili, I., Marrington, A.: Forensic analysis of social networking applications on mobile devices. Digit. Investig. 9(Suppl.), S24\u2013S33 (2012). The Proceedings of the Twelfth Annual DFRWS Conference and 12th Annual Digital Forensics Research Conference","journal-title":"Digit. Investig."},{"key":"15_CR9","unstructured":"Schiebeck, S., Latzenhofer, M., Palensky, B., Schauer, S., Quirchmayr, G., Benesch,T., G\u00f6llner, J., Meurers, C., Mayr, I.: Implementation of a generic ICT risk model using graph databases. In: Proceedings of the Ninth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2015, pp. 146\u2013153, August 2015"},{"key":"15_CR10","doi-asserted-by":"crossref","first-page":"S74","DOI":"10.1016\/j.diin.2010.05.010","volume":"7","author":"VLL Thing","year":"2010","unstructured":"Thing, V.L.L., Ng, K.Y., Chang, E.C.: Live memory forensics of mobile phones. Digit. Investig. 7, S74\u2013S82 (2010)","journal-title":"Digit. Investig."},{"issue":"4","key":"15_CR11","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MVT.2011.942809","volume":"6","author":"N Xu","year":"2011","unstructured":"Xu, N., Jia, W., Luo, Y., Zhang, F., Xuan, D., Teng, J.: An opened eye on you. IEEE Veh. Technol. Mag. 6(4), 49\u201359 (2011)","journal-title":"IEEE Veh. Technol. Mag."}],"container-title":["Lecture Notes in Computer Science","Future Data and Security Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48057-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T01:51:37Z","timestamp":1498355497000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48057-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319480565","9783319480572"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48057-2_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}