{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T03:16:35Z","timestamp":1725938195193},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319736969"},{"type":"electronic","value":"9783319736976"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-73697-6_8","type":"book-chapter","created":{"date-parts":[[2018,1,5]],"date-time":"2018-01-05T02:53:43Z","timestamp":1515120823000},"page":"106-114","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Fuzzy System-Based Suspicious Pattern Detection in Mobile Forensic Evidence"],"prefix":"10.1007","author":[{"given":"Konstantia","family":"Barmpatsalou","sequence":"first","affiliation":[]},{"given":"Tiago","family":"Cruz","sequence":"additional","affiliation":[]},{"given":"Edmundo","family":"Monteiro","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Simoes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,6]]},"reference":[{"issue":"4","key":"8_CR1","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1016\/j.diin.2013.10.003","volume":"10","author":"K Barmpatsalou","year":"2013","unstructured":"Barmpatsalou, K., Damopoulos, D., Kambourakis, G., Katos, V.: A critical review of 7 years of mobile device forensics. Digit. Invest. 10(4), 323\u2013349 (2013)","journal-title":"Digit. Invest."},{"key":"8_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15600-7","volume-title":"Fuzzy Networks for Complex Systems: A Modular Rule Base Approach","author":"A Gegov","year":"2011","unstructured":"Gegov, A.: Fuzzy Networks for Complex Systems: A Modular Rule Base Approach, vol. 259. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-15600-7"},{"key":"8_CR3","doi-asserted-by":"crossref","DOI":"10.1002\/9781118534823","volume-title":"Computational Intelligence: Synergies of Fuzzy Logic, Neural Networks and Evolutionary Computing","author":"N Siddique","year":"2013","unstructured":"Siddique, N., Adeli, H.: Computational Intelligence: Synergies of Fuzzy Logic, Neural Networks and Evolutionary Computing. Wiley, Hoboken (2013)"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Stoffel, K., Cotofrei, P., Han, D: Fuzzy methods for forensic data analysis. In: 2010 International Conference of Soft Computing and Pattern Recognition, pp. 23\u201328 (2010)","DOI":"10.1109\/SOCPAR.2010.5685848"},{"issue":"3","key":"8_CR5","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1016\/j.comcom.2012.09.010","volume":"36","author":"PAR Kumar","year":"2013","unstructured":"Kumar, P.A.R., Selvakumar, S.: Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems. Comput. Commun. 36(3), 303\u2013319 (2013)","journal-title":"Comput. Commun."},{"key":"8_CR6","unstructured":"Shalaginov, A., Franke, K.: Automatic rule-mining for malware detection employing neuro-fuzzy approach. In: Norsk informasjons sikkerhets konferanse (NISK) (2013)"},{"key":"8_CR7","unstructured":"Nyanyo, A., Marques, H., Wickson, P., Brouwer, F., Blaha, M., Jelenc, D., Brouet, J., Junittila, K., Kolundzija, B.: Deliverable 2.3: SALUS use cases final. Technical report, SALUS Consortium (2014)"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Wagner, D.T., Rice, A., Beresford, A.R.: Device analyzer: understanding smartphone usage. In: 10th International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, MOBIQUITOUS 2013, Tokyo, Japan (2013)","DOI":"10.1007\/978-3-319-11569-6_16"},{"key":"8_CR9","volume-title":"Neural Fuzzy Systems","author":"R Fuller","year":"1995","unstructured":"Fuller, R.: Neural Fuzzy Systems. Abo, Turku (1995)"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"de Lima, H.P., de Arruda Camargo, H.: A methodology for building fuzzy rule-based systems integrating expert and data knowledge. In: 2014 Brazilian Conference on Intelligent Systems, pp. 300\u2013305 (2014)","DOI":"10.1109\/BRACIS.2014.61"},{"issue":"10","key":"8_CR11","doi-asserted-by":"crossref","first-page":"8744","DOI":"10.1016\/j.eswa.2012.01.206","volume":"39","author":"S Guillaume","year":"2012","unstructured":"Guillaume, S., Charnomordic, B.: Fuzzy inference systems: an integrated modeling environment for collaboration between expert knowledge and data using FISPRO. Expert Syst. Appl. 39(10), 8744\u20138755 (2012)","journal-title":"Expert Syst. Appl."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-73697-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,30]],"date-time":"2023-08-30T11:32:54Z","timestamp":1693395174000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-73697-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319736969","9783319736976"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-73697-6_8","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}