{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,9]],"date-time":"2025-02-09T18:40:02Z","timestamp":1739126402187,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642023118"},{"type":"electronic","value":"9783642023125"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02312-5_2","type":"book-chapter","created":{"date-parts":[[2009,5,25]],"date-time":"2009-05-25T12:15:04Z","timestamp":1243253704000},"page":"10-18","source":"Crossref","is-referenced-by-count":0,"title":["Forensics for Detecting P2P Network Originated MP3 Files on the User Device"],"prefix":"10.1007","author":[{"given":"Heikki","family":"Kokkinen","sequence":"first","affiliation":[]},{"given":"Janne","family":"N\u00f6yr\u00e4nen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","volume-title":"Building Society Through E-Commerce","author":"K. Alves","year":"2005","unstructured":"Alves, K., Michael, K.: The Rise and Fall of Digital Music Distribution Services: a Cross-Case Comparison of MP3.com, Napster and Kazaa. In: Cerpa, N., Bro, P. (eds.) Building Society Through E-Commerce, 1st edn., University of Talca, Talca (2005)","edition":"1"},{"unstructured":"Creative Commons licenses, http:\/\/creativecommons.org\/licenses\/","key":"2_CR2"},{"unstructured":"World of Warcraft \u2013 Frequently Asked Questions, http:\/\/www.blizzard.co.uk\/wow\/faq\/bittorrent.shtml","key":"2_CR3"},{"key":"2_CR4","first-page":"1278","volume-title":"5th Consumer Communications and Networking Conference, CCNC","author":"H. Kokkinen","year":"2008","unstructured":"Kokkinen, H., Ekberg, J.E.: Post-payment copyright for digital content. In: 5th Consumer Communications and Networking Conference, CCNC, pp. 1278\u20131283. IEEE, Las Vegas (2008)"},{"unstructured":"Broucek, V., Turner, P.: Computer Incident Investigations: e-forensic Insights on Evidence Acquisition. In: 13th Annual EICAR Conference, Grand-Duche du Luxembourg (2004)","key":"2_CR5"},{"doi-asserted-by":"crossref","unstructured":"Ho, G.L., Taek, Y.N., Jong S.J.: The method of P2P traffic detecting for P2P harmful contents prevention. In: 7th International Conference on Advanced Communication Technology, vol. 2, pp. 777\u2013780 (2005)","key":"2_CR6","DOI":"10.1109\/ICACT.2005.246067"},{"doi-asserted-by":"crossref","unstructured":"Togawa, S., Kanenishi, K., Yano, Y.: Peer-to-Peer File Sharing Communication Detection System Using Network Traffic Mining. HCI (8), 769\u2013778 (2007)","key":"2_CR7","DOI":"10.1007\/978-3-540-73345-4_87"},{"doi-asserted-by":"crossref","unstructured":"Nikolaidis, N., Giannoula, A.: Robust Zero-Bit and Multi-Bit Audio Watermarking Using Correlation Detection and Chaotic. In: Digital Audio Watermarking Techniques and Technologies: Applications and Benchmarks. Idea Group Inc. (IGI) (2007)","key":"2_CR8","DOI":"10.4018\/978-1-59904-513-9.ch004"},{"unstructured":"Koso, A., Turi, A., Obimbo, C.: Embedding Digital Signatures in MP3s. IMSA. pp. 271\u2013274 (2005)","key":"2_CR9"},{"doi-asserted-by":"crossref","unstructured":"Sung, B., Jung, M., Ham, J., Kim, J., Ko, I.: Feature Based Same Audio Perception method for Filtering of Illegal Music Contents. In: 10th Int. conference on Advanced Communication Technology, ICACT, pp. 2194\u20132198 (2008)","key":"2_CR10","DOI":"10.1109\/ICACT.2008.4494225"},{"key":"2_CR11","first-page":"25","volume-title":"International Multimedia conference, workshop on Multimedia and security","author":"R. B\u00f6hme","year":"2004","unstructured":"B\u00f6hme, R., Westfeld, A.: Statistical characterisation of MP3 encoders for steganalysis. In: International Multimedia conference, workshop on Multimedia and security, pp. 25\u201334. Magdeburg, Germany (2004)"},{"unstructured":"Fake MP3 detector, http:\/\/www.sharewareconnection.com\/fake-MP3-detector.htm","key":"2_CR12"},{"doi-asserted-by":"crossref","unstructured":"Mee, J., Watters, P.A.: Detecting and Tracing Copyright Infringements in P2P Networks. In: International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL 2006), p. 60 (2006)","key":"2_CR13","DOI":"10.1109\/ICNICONSMCL.2006.77"},{"unstructured":"MP3 Kingz, http:\/\/www.mp3kingz.org\/","key":"2_CR14"},{"unstructured":"NfoDB.com, http:\/\/www.nfodb.com\/section_4_mp3_nfo.html","key":"2_CR15"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Forensics in Telecommunications, Information and Multimedia"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02312-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,9]],"date-time":"2025-02-09T17:59:06Z","timestamp":1739123946000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02312-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642023118","9783642023125"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02312-5_2","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2009]]}}}