{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:10:36Z","timestamp":1725538236197},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041549"},{"type":"electronic","value":"9783642041556"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04155-6_13","type":"book-chapter","created":{"date-parts":[[2009,9,29]],"date-time":"2009-09-29T12:04:42Z","timestamp":1254225882000},"page":"175-186","source":"Crossref","is-referenced-by-count":4,"title":["A Model for Foxy Peer-to-Peer Network Investigations"],"prefix":"10.1007","author":[{"given":"Ricci","family":"Ieong","sequence":"first","affiliation":[]},{"given":"Pierre","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Kam-Pui","family":"Chow","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Law","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Kwan","sequence":"additional","affiliation":[]},{"given":"Kenneth","family":"Tse","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Architecture Technology Corporation, P2P Marshal Digital Forensics Software, Eden Prairie, Minnesota (p2pmarshal.atc-nycorp .com)."},{"key":"13_CR2","unstructured":"E. Bangeman, P2P responsible for as much as 90 percent of all \u2019Net traffic, Ars Technica, September 3, 2007."},{"key":"13_CR3","unstructured":"BBC News, BitTorrent user guilty of piracy (news.bbc.co.uk\/1\/hi \/technology\/4374222.stm), October 25, 2005."},{"key":"13_CR4","unstructured":"J. Cheng, Sandvine: Close to half of all bandwidth sucked up by P2P, Ars Technica, June 23, 2008."},{"key":"13_CR5","unstructured":"M. Chesterton, Edison Chen and 7 HK stars involved in sex photos scandal, eNews 2.0, February 21, 2008."},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"K. Chow, K. Cheng, L. Man, P. Lai, L. Hui, C. Chong, K. Pun, W. Tsang, H. Chan and S. Yiu, BTM - An automated rule-based BT monitoring system for piracy detection, Proceedings of the Second International Conference on Internet Monitoring and Protection, p. 2, 2007.","DOI":"10.1109\/ICIMP.2007.10"},{"key":"13_CR7","unstructured":"K. Chow, R. Ieong, M. Kwan, P. Lai, F. Law, H. Tse and K. Tse, Security Analysis of the Foxy Peer-to-Peer File-Sharing Tool, Technical Report TR-2008-09, Department of Computer Science, University of Hong Kong, Hong Kong, 2008."},{"key":"13_CR8","unstructured":"Discordia, Shareaza, New York (www.shareaza.com)."},{"key":"13_CR9","unstructured":"Gnutella2, Gnutella2 Developer Network (g2.trillinux.org)."},{"key":"13_CR10","unstructured":"R. Ieong, P. Lai, K. Chow, M. Kwan, F. Law, H. Tse and K. Tse, Forensic investigation and analysis of peer-to-peer file-sharing networks (submitted for publication), 2009."},{"key":"13_CR11","unstructured":"P. Moy, Warning over rape clips, The Standard, Hong Kong, September 12, 2008."},{"key":"13_CR12","unstructured":"P. Moy and N. Patel, Covert cops hit by leaks, The Standard, Hong Kong, May 27, 2008."},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"O. Nasraoui, D. Keeling, A. Elmaghraby, G. Higgins and M. Losavio, Node-based probing and monitoring to investigate the use of peer-to-peer technologies for the distribution of contraband material, Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 135\u2013140, 2008.","DOI":"10.1109\/SADFE.2008.16"},{"key":"13_CR14","unstructured":"Vastel Technology, Foxy, Hong Kong (www.gofoxy.net)."},{"key":"13_CR15","unstructured":"Wireshark Foundation, Wireshark, San Jose, California (www.wire shark.org)."},{"key":"13_CR16","unstructured":"Zemerick Software, Spear Forensics Software, Oak Hill, West Virginia (www.spearforensics.com\/products\/forensicp2p\/index.aspx)."}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics V"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04155-6_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,25]],"date-time":"2019-01-25T14:33:45Z","timestamp":1548426825000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04155-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642041549","9783642041556"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04155-6_13","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}