{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T23:48:47Z","timestamp":1725925727517},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319725970"},{"type":"electronic","value":"9783319725987"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72598-7_2","type":"book-chapter","created":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T17:06:49Z","timestamp":1512148009000},"page":"9-26","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["SOF on Trial. The Technical and Legal Value of Battlefield Digital Forensics in Court"],"prefix":"10.1007","author":[{"given":"Luigi V.","family":"Mancini","sequence":"first","affiliation":[]},{"given":"Andrea","family":"Monti","sequence":"additional","affiliation":[]},{"given":"Agostino","family":"Panico","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,2]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1016\/j.diin.2005.10.002","volume":"2","author":"A Monti","year":"2005","unstructured":"Monti, A., Kennealy, E.: Case study: a failure success clothing. Digit. Invest. 2, 247\u2013253 (2005)","journal-title":"Digit. Invest."},{"key":"2_CR2","unstructured":"United States v. Harrington, 923 F.2d 1371 (1994)"},{"key":"2_CR3","unstructured":"United States Supreme Court - Utah vs. Strieff - Certiorari to the Supreme Court of Utah No. 14\u20131373. Argued 22 February 2016\u2014Decided 20 June 2016"},{"key":"2_CR4","unstructured":"Criminal Court of Bologna, Decision n. 1823\/05 (2017)"},{"key":"2_CR5","unstructured":"Criminal Court, Decision n. 44851 (2012)"},{"key":"2_CR6","unstructured":"Braccini, C., Vaisanen, T., Sadlon, M. et. al.: Battlefield Digital Forensics Digital Intelligence and Evidence, pp. 1\u201369 (2016)"},{"key":"2_CR7","unstructured":"Corte di cassazione (Italian Supreme Court) Orders nn. 8605 and 8606 (2015)"},{"key":"2_CR8","unstructured":"Corte di cassazione (Italian Supreme Court) Orders n. 9760 (2015)"},{"key":"2_CR9","unstructured":"Chiccarelli, S., Monti, A.: Spaghetti Hacker. Pescara: s.n., p. 187 (2011)"},{"key":"2_CR10","unstructured":"Pearson, S., Watson, R.: Digital Triage Forensics. s.l.: Syngress (2010)"},{"key":"2_CR11","first-page":"19","volume":"1","author":"MK Rogers","year":"2006","unstructured":"Rogers, M.K., et al.: Computer forensics field triage process model. J. Digit. Forensics Secur. Law 1, 19\u201338 (2006)","journal-title":"J. Digit. Forensics Secur. Law"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Grillo, A., et al.: Fast user classifying to establish forensic analysis priorities. In: Fifth International Conference on IT Security Incident Management and IT Forensics (2009)","DOI":"10.1109\/IMF.2009.16"},{"key":"2_CR13","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/j.diin.2013.01.001","volume":"10","author":"F Marturana","year":"2013","unstructured":"Marturana, F., Tacconi, S.: A Machine Learning-based Triage methodology for automated categorization of digital media. Digit. Invest. 10, 193\u2013204 (2013)","journal-title":"Digit. Invest."},{"key":"2_CR14","unstructured":"NATO CCDCOE. Crossed Sword Exercise. Tallinn: s.n. (2017)"},{"key":"2_CR15","unstructured":"Giannelli, P.C.: Chain of Custody and Identification of Real Evidence. s.l.: Case Western Reserve University (1983)"},{"key":"2_CR16","first-page":"42","volume":"5","author":"T Saaralein","year":"2012","unstructured":"Saaralein, T.: Optimizing the performance of a dismounted future force warrior by means of improved situational awareness. Int. J. Adv. Telecommun. 5, 42\u201354 (2012)","journal-title":"Int. J. Adv. Telecommun."},{"key":"2_CR17","unstructured":"OSForensics [Online] (2017). [Cited: 22 May 2017]. \nhttp:\/\/www.osforensics.com"},{"key":"2_CR18","volume-title":"Faraday Cage","author":"H Mohseni","year":"2006","unstructured":"Mohseni, H.: Faraday Cage. University of Tehran High Voltage Lab, Tehran (2006)"},{"key":"2_CR19","unstructured":"Bussoletti, F.: Analisi Difesa [Online], 27 October 2016. [Cited: 22 May 2017]. \nhttp:\/\/www.analisidifesa.it\/2016\/10\/tornado-anti-droga\/"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72598-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T17:07:58Z","timestamp":1512148078000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72598-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319725970","9783319725987"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72598-7_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}