{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T04:14:12Z","timestamp":1749701652628,"version":"3.41.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491080"},{"type":"electronic","value":"9783319491097"}],"license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49109-7_39","type":"book-chapter","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T09:03:15Z","timestamp":1477040595000},"page":"415-424","source":"Crossref","is-referenced-by-count":3,"title":["Semantic Integration and Correlation of Digital Evidences in Forensic Investigations"],"prefix":"10.1007","author":[{"given":"Flora","family":"Amato","sequence":"first","affiliation":[]},{"given":"Giovanni","family":"Cozzolino","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Mazzocca","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"key":"39_CR1","doi-asserted-by":"crossref","unstructured":"S. Raghavan, \u201cDigital forensic research: current state of the art,\u201d CSI Transactions on ICT, vol. 1, no. 1, pp. 91\u2013114, 2013.","DOI":"10.1007\/s40012-012-0008-7"},{"key":"39_CR2","doi-asserted-by":"crossref","unstructured":"A. Cilardo, A. Mazzeo, L. Romano, and G. Saggese, \u201cAn FPGA-based key-store for improving the dependability of security services,\u201d 2005, pp. 389\u2013396.","DOI":"10.1109\/WORDS.2005.16"},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"A. Cilardo, \u201cExploring the potential of threshold logic for cryptography-related operations,\u201d IEEE Transactions on Computers, vol. 60, no. 4, pp. 452\u2013462, 2011.","DOI":"10.1109\/TC.2010.116"},{"key":"39_CR4","unstructured":"D. Lillis, B. Becker, T. O\u2019Sullivan, and M. Scanlon, \u201cCurrent Challenges and Future Research Areas for Digital Forensic Investigation,\u201d 05 2016."},{"key":"39_CR5","doi-asserted-by":"crossref","unstructured":"X. Wang, D. Huang, I. Akturk, M. Balman, G. Allen, and T. Kosar, \u201cSemantic enabled metadata management in petashare,\u201d International Journal of Grid and Utility Computing, vol. 1, no. 4, pp. 275\u2013286, 2009.","DOI":"10.1504\/IJGUC.2009.027917"},{"key":"39_CR6","doi-asserted-by":"crossref","unstructured":"A. Eftychiou, B. Vrusias, and N. Antonopoulos, \u201cA dynamically semantic platform for efficient information retrieval in p2p networks,\u201d International Journal of Grid and Utility Computing, vol. 3, no. 4, pp. 271\u2013283, 2012.","DOI":"10.1504\/IJGUC.2012.051424"},{"key":"39_CR7","doi-asserted-by":"crossref","unstructured":"C. Lai and C. Moulin, \u201cSemantic indexing modelling of resources within a distributed system,\u201d International Journal of Grid and Utility Computing, vol. 4, no. 1, pp. 21\u201339, 2013.","DOI":"10.1504\/IJGUC.2013.054488"},{"key":"39_CR8","unstructured":"E. Casey, Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet, 3rd ed. Academic Press, 2011."},{"key":"39_CR9","unstructured":"S. W. G. on Digital Evidence (SWGDE) International Organization on Digital Evidence (IOCE), \u201cDigital evidence: Standards and principles,\u201d https:\/\/archives.fbi.gov\/archives\/about-us\/lab\/forensic-science-communications\/fsc\/april2000\/swgde.htm#Definitions ."},{"key":"39_CR10","unstructured":"B. Carrier and E. H. Spafford, \u201cAn event-based digital forensic investigation framework,\u201d in Digital forensic research workshop, 2004, pp. 11\u201313."},{"key":"39_CR11","unstructured":"B. L. Schatz, \u201cDigital evidence: representation and assurance,\u201d Ph.D. dissertation, Queensland University of Technology, 2007. [Online]. Available: http:\/\/eprints.qut.edu.au\/16507\/"},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"A. Case, A. Cristina, L. Marziale, G. G. Richard, and V. Roussev, \u201cFace: Automated digital evidence discovery and correlation,\u201d Digit. Investig., vol. 5, pp. S65\u2013S75, Sep. 2008.","DOI":"10.1016\/j.diin.2008.05.008"},{"key":"39_CR13","doi-asserted-by":"crossref","unstructured":"S. L. Garfinkel, \u201cAutomating disk forensic processing with sleuthkit, xml and python,\u201d in Systematic Approaches to Digital Forensic Engineering, 2009. SADFE\u201909. Fourth International IEEE Workshop on. IEEE, 2009, pp. 73\u201384.","DOI":"10.1109\/SADFE.2009.12"},{"key":"39_CR14","doi-asserted-by":"crossref","unstructured":"B. N. Levine and M. Liberatore, \u201cDex: Digital evidence provenance supporting reproducibility and comparison,\u201d digital investigation, vol. 6, pp. S48\u2013S56, 2009.","DOI":"10.1016\/j.diin.2009.06.011"},{"key":"39_CR15","doi-asserted-by":"crossref","unstructured":"F. Amato, G. De Pietro, M. Esposito, and N. Mazzocca, \u201cAn integrated framework for securing semi-structured health records,\u201d Knowledge-Based Systems, vol. 79, pp. 99\u2013117, 2015.","DOI":"10.1016\/j.knosys.2015.02.004"},{"key":"39_CR16","doi-asserted-by":"crossref","unstructured":"S. L. Garfinkel, \u201cAff: A new format for storing hard drive images,\u201d Commun. ACM, vol. 49, no. 2, pp. 85\u201387, Feb. 2006.","DOI":"10.1145\/1113034.1113076"},{"key":"39_CR17","doi-asserted-by":"crossref","unstructured":"M. Cohen and B. Schatz, \u201cHash based disk imaging using {AFF4},\u201d Digital Investigation, vol. 7, Supplement, pp. S121 \u2013 S128, 2010, the Proceedings of the Tenth Annual {DFRWS} Conference.","DOI":"10.1016\/j.diin.2010.05.015"},{"key":"39_CR18","unstructured":"G. Giova, \u201cImproving chain of custody in forensic investigation of electronic digital systems,\u201d International Journal of Computer Science and Network Security, vol. 11, no. 1, pp. 1\u20139, 2011."},{"key":"39_CR19","unstructured":"B. Schatz, G. M. Mohay, and A. Clark, \u201cGeneralising event forensics across multiple domains.\u201d School of Computer Networks Information and Forensics Conference, Edith Cowan University, 2004."},{"key":"39_CR20","doi-asserted-by":"crossref","unstructured":"F. Amato, A. Mazzeo, A. Penta, and A. Picariello, \u201cBuilding rdf ontologies from semistructured legal documents,\u201d in 2008 International Conference on Complex, Intelligent and Software Intensive Systems, 2008.","DOI":"10.1109\/CISIS.2008.146"},{"key":"39_CR21","unstructured":"B. Schatz, G. Mohay, and A. Clark, \u201cRich event representation for computer forensics\u2019,\u201d in Proceedings of the Fifth Asia-Pacific Industrial Engineering and Management Systems Conference (APIEMS 2004), vol. 2, no. 12. Citeseer, 2004, pp. 1\u201316."},{"key":"39_CR22","doi-asserted-by":"crossref","unstructured":"D. Kahved\u017ei\u0107 and T. Kechadi, \u201cSemantic modelling of digital forensic evidence,\u201d in International Conference on Digital Forensics and Cyber Crime. Springer, 2010, pp. 149\u2013156.","DOI":"10.1007\/978-3-642-19513-6_13"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on P2P, Parallel, Grid, Cloud and Internet Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49109-7_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T19:00:40Z","timestamp":1749668440000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49109-7_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"ISBN":["9783319491080","9783319491097"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49109-7_39","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2016,10,22]]}}}