{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:09:54Z","timestamp":1725538194737},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041549"},{"type":"electronic","value":"9783642041556"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04155-6_22","type":"book-chapter","created":{"date-parts":[[2009,9,29]],"date-time":"2009-09-29T08:04:42Z","timestamp":1254211482000},"page":"291-300","source":"Crossref","is-referenced-by-count":7,"title":["Concept Mapping for Digital Forensic Investigations"],"prefix":"10.1007","author":[{"given":"April","family":"Tanner","sequence":"first","affiliation":[]},{"given":"David","family":"Dampier","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"V. Baryamureeba and F. Tushabe, The enhanced digital investigation process model, Proceedings of the Fourth Digital Forensic Research Workshop, 2004."},{"key":"22_CR2","unstructured":"N. Beebe and J. Clark, A hierarchical, objectives-based framework for the digital investigation process, Proceedings of the Fourth Digital Forensic Research Workshop, 2004."},{"key":"22_CR3","unstructured":"A. Bogen, Selecting Keyword Search Terms in Computer Forensic Examinations using Domain Analysis and Modeling, Ph.D. Dissertation, Department of Computer Science and Engineering, Mississippi State University, Mississippi State, Mississippi, 2006."},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"A. Bogen and D. Dampier, Unifying computer forensics modeling approaches: A software engineering perspective, Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 27\u201339, 2005.","DOI":"10.1109\/SADFE.2005.27"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"D. Brezinski and T. Killalea, RFC3227: Guideline for Evidence Collection and Archiving, Networking Working Group, Internet Engineering Task Force (www.ietf.org\/rfc\/rfc3227.txt), 2002.","DOI":"10.17487\/rfc3227"},{"key":"22_CR6","unstructured":"B. Carrier and E. Spafford, An event-based digital forensic investigation framework, Proceedings of the Fourth Digital Forensic Research Workshop, 2004."},{"key":"22_CR7","unstructured":"S. Ciardhuain, An extended model of cybercrime investigations, International Journal of Digital Evidence, vol. 3(1), 2004."},{"key":"22_CR8","unstructured":"M. Kramer, Using Concept Maps for Knowledge Acquisition in Satellite Design: Translating \u201cStatement of Requirements on Orbit\u201d to \u201cDesign Requirements,\u201d Ph.D. Dissertation, Graduate School of Computer and Information Sciences, Nova Southeastern University, Fort Lauderdale-Davie, Florida, 2005."},{"key":"22_CR9","volume-title":"Computer Forensics: Incident Response Essentials","author":"W. Kruse","year":"2001","unstructured":"W. Kruse and J. Heiser, Computer Forensics: Incident Response Essentials, Addison-Wesley, Boston, Massachusetts, 2001."},{"key":"22_CR10","unstructured":"M. Noblett, M. Pollitt and L. Presley, Recovering and examining computer forensic evidence, Forensic Science Communications, vol. 2(4), 2000."},{"key":"22_CR11","unstructured":"J. Novak and A. Canas, The Theory Underlying Concept Maps and How to Construct and Use Them, Technical Report IHMC Cmap Tools 2006-01, Florida Institute for Human and Machine Cognition, Pensacola, Florida, 2006."},{"key":"22_CR12","unstructured":"G. Palmer, A Road Map for Digital Forensic Research, DFRWS Technical Report, DTR-T001-01 Final, Air Force Research Laboratory, Rome, New York, 2001."},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"M. Pollitt, An ad hoc review of digital forensic models, Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 43\u201354, 2007.","DOI":"10.1109\/SADFE.2007.3"},{"key":"22_CR14","unstructured":"G. Ruibin, T. Yun and M. Gaertner, Case-relevance information investigation: Binding computer intelligence to the current computer forensic framework, International Journal of Digital Evidence, vol. 4(1), 2005."},{"key":"22_CR15","unstructured":"United States Department of Justice, Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations, Washington, DC (www.usdoj.gov\/criminal\/cybercrime\/s&s manual2002.pdf), 2002."},{"key":"22_CR16","volume-title":"Computer Forensics: Computer Crime Scene Investigation","author":"J. Vacca","year":"2005","unstructured":"J. Vacca, Computer Forensics: Computer Crime Scene Investigation, Charles River Media, Boston, Massachusetts, 2005."},{"key":"22_CR17","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/0-387-36891-4_26","volume-title":"Advances in Digital Forensics II","author":"J. Venter","year":"2006","unstructured":"J. Venter, Process flow diagrams for training and operations, in Advances in Digital Forensics II, M. Olivier and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 331\u2013342, 2006."}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics V"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04155-6_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T18:38:28Z","timestamp":1558550308000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04155-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642041549","9783642041556"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04155-6_22","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}