{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:33:29Z","timestamp":1725564809396},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540244677"},{"type":"electronic","value":"9783540305828"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-30582-8_7","type":"book-chapter","created":{"date-parts":[[2010,9,7]],"date-time":"2010-09-07T06:10:32Z","timestamp":1283839832000},"page":"62-71","source":"Crossref","is-referenced-by-count":8,"title":["Experience with Engineering a Network Forensics System"],"prefix":"10.1007","author":[{"given":"Ahmad","family":"Almulhem","sequence":"first","affiliation":[]},{"given":"Issa","family":"Traore","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Richardson, R.: 2003 csi\/fbi computer crime and security survey (2003)","DOI":"10.1016\/S1361-3723(03)00208-2"},{"key":"7_CR2","unstructured":"Ranum, M.: Network forensics: Network traffic monitoring. NFR Inc. (1997)"},{"key":"7_CR3","unstructured":"Ranum, M., et al.: Implementing a generalized tool for network monitoring. In: Proceedings of the Eleventh Systems Administration Conference (LISA 1997) (1997)"},{"key":"7_CR4","unstructured":"searchSecurity.com: Definitions, http:\/\/www.searchsecurity.techtarget.com"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Sommer, P.: Intrusion detection systems as evidence. Computer Net.\u00a031 (1999)","DOI":"10.1016\/S1389-1286(99)00113-9"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Brezinski, D., Killalea, T.: Guidelines for evidence collection and archiving. BCP 55, RFC 3227 (2002)","DOI":"10.17487\/rfc3227"},{"key":"7_CR7","unstructured":"Fennelly, C.: Analysis: The forensics of internet security. SunWorld (2000)"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Berghel, H.: The discipline of internet forensics. Comm. of the ACM (2003)","DOI":"10.1145\/859670.859687"},{"key":"7_CR9","unstructured":"King, N., Weiss, E.: Analyze this! Information Security Magazine (2002)"},{"key":"7_CR10","unstructured":"Balas, E.: Know Your Enemy: Sebek. Honeynet Project (2003)"},{"key":"7_CR11","unstructured":"Spitzner, L.: Honeynetproject, http:\/\/www.honeynet.org"},{"key":"7_CR12","unstructured":"Roesch, M., Green, C.: Snort Users Manual (2003)"},{"key":"7_CR13","unstructured":"MySQL, http:\/\/www.mysql.com"},{"key":"7_CR14","unstructured":"Danyliw, R.: Analysis console for intrusion databases, acidlab.sourceforge.net"},{"key":"7_CR15","unstructured":"tcpdump\/libpcap, http:\/\/www.tcpdump.org"}],"container-title":["Lecture Notes in Computer Science","Information Networking. Convergence in Broadband and Mobile Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30582-8_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:31:41Z","timestamp":1620012701000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30582-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540244677","9783540305828"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30582-8_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}