{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T14:58:45Z","timestamp":1725548325443},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041167"},{"type":"electronic","value":"9783642041174"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-04117-4_36","type":"book-chapter","created":{"date-parts":[[2010,2,22]],"date-time":"2010-02-22T11:44:00Z","timestamp":1266839040000},"page":"789-808","source":"Crossref","is-referenced-by-count":11,"title":["Fundamentals of Digital Forensic Evidence"],"prefix":"10.1007","author":[{"given":"Frederick B.","family":"Cohen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"5","key":"36_CR1","doi-asserted-by":"publisher","first-page":"1344","DOI":"10.1109\/TMAG.1985.1063972","volume":"21","author":"P.H. Siegel","year":"1985","unstructured":"P.H.\u00a0Siegel: Recording codes for digital magnetic storage, IEEE Trans. Magn. 21(5), 1344\u20131349 (1985)","journal-title":"IEEE Trans. Magn."},{"key":"36_CR2","unstructured":"F.\u00a0Cohen: Challenges to Digital Forensic Evidence (ASP Press, 2008)"},{"key":"36_CR3","unstructured":"Sedona Conference Working Group: The Sedona guidelines: best practice guidelines and commentary for managing information and Records in the electronic Age, a project of the Sedona Conference Working Group on best practices for electronic document retention and production, Public Comment Draft (September 2004)"},{"key":"36_CR4","unstructured":"A guide to understanding data remanence in automated information systems, NCSC-TG-025 \u2013 Library No. 5-236,082 \u2013 Version-2, available at http:\/\/all.net\/books\/standards\/remnants\/index.html"},{"key":"36_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89862-7_21","volume-title":"Information Systems Security","author":"C. Wright","year":"2008","unstructured":"C.\u00a0Wright, D.\u00a0Kleiman, R.\u00a0Shyaam Sundhar: Overwriting hard drive data: the great wiping controversy. In: Information Systems Security, Lecture Notes in Computer Science, Vol. 5352, ed. by R.\u00a0Sekar, A.K.\u00a0Pujari (Springer, Berlin Heidelberg 2008)"},{"key":"36_CR6","unstructured":"P.\u00a0Gutmann: Secure deletion of data from magnetic and solid-state memory, Proc. 6th USENIX Security Symposium, San Jose, California, 22\u201325 July 1996 (1996)"},{"key":"36_CR7","unstructured":"The U.S. Federal Rules of Evidence"},{"key":"36_CR8","unstructured":"Daubert vs. Merrell Dow Pharmaceuticals, Inc., 509 U.S. 579, 125 L. Ed. 2d 469, 113 S. Ct. 2786 (1993)"},{"key":"36_CR9","unstructured":"J. R. Lyle, D. R. White, R. P. Ayers: Digital forensics at the National Institute of Standards and Technology, NISTIR 7490"},{"key":"36_CR10","unstructured":"IEEE Design and Test of Computers, issues available starting in 1985 at http:\/\/www2.computer.org\/portal\/web\/csdl\/magazines\/dt#1"},{"key":"36_CR11","unstructured":"Frye vs. United States, 293 F 1013 D.C. Cir, 1923"},{"key":"36_CR12","unstructured":"The Constitution of the United States of America, available at http:\/\/www.archives.gov\/exhibits\/charters\/constitution.html"},{"volume-title":"Advances in Digital Forensics II","year":"2006","key":"36_CR13","unstructured":"M. S. Olivier, S. Shenoi (Eds): Advances in Digital Forensics II (Springer, Boston 2006), ISBN-13:978-0387368900"},{"key":"36_CR14","doi-asserted-by":"crossref","unstructured":"T.\u00a0Johnson (Ed.): Forensic Computer Crime Investigation (Taylor and Francis, 2006)","DOI":"10.1201\/9781420028379"},{"key":"36_CR15","unstructured":"E.\u00a0Casey: Digital Evidence and Computer Crime, 2nd edn. (Academic, 2004), ISBN 0121631048"}],"container-title":["Handbook of Information and Communication Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04117-4_36.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:39:28Z","timestamp":1606167568000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04117-4_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642041167","9783642041174"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04117-4_36","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}