{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T00:37:31Z","timestamp":1769215051816,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642041549","type":"print"},{"value":"9783642041556","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04155-6_3","type":"book-chapter","created":{"date-parts":[[2009,9,29]],"date-time":"2009-09-29T08:04:42Z","timestamp":1254211482000},"page":"37-47","source":"Crossref","is-referenced-by-count":14,"title":["Towards a Formalization of Digital Forensics"],"prefix":"10.1007","author":[{"given":"Jill","family":"Slay","sequence":"first","affiliation":[]},{"given":"Yi-Chi","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Turnbull","sequence":"additional","affiliation":[]},{"given":"Jason","family":"Beckett","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"3_CR1","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/S1363-4127(98)80040-X","volume":"3","author":"J. Bates","year":"1998","unstructured":"J. Bates, Fundamentals of computer forensics, Information Security Technical Report, vol. 3(4), pp. 75\u201378, 1998.","journal-title":"Information Security Technical Report"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"J. Beckett and J. Slay, Digital forensics: Validation and verification in a dynamic work environment, Proceedings of the Fortieth Annual Hawaii International Conference on System Sciences, p. 266, 2007.","DOI":"10.1109\/HICSS.2007.175"},{"key":"3_CR3","unstructured":"B. Carrier and E. Spafford, Getting physical with the digital investigation process, International Journal of Digital Evidence, vol. 2(2), 2003."},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"V. Civie and R. Civie, Future technologies from trends in computer forensic science, Proceedings of the IEEE Information Technology Conference, pp.105\u2013108, 1998.","DOI":"10.1109\/IT.1998.713392"},{"key":"3_CR5","unstructured":"Electronic Evidence Specialist Advisory Group, Electronic Evidence Specialist Advisory Group Workshop, National Institute of Forensic Science, Melbourne, Australia, 2006."},{"key":"3_CR6","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/S1353-4858(03)00006-0","volume":"12","author":"D. Forte","year":"2003","unstructured":"D. Forte, Principles of digital evidence collection, Network Security, no. 12, pp. 6\u20137, 2003.","journal-title":"Network Security"},{"key":"3_CR7","unstructured":"A. Lin, I. Lin, T. Lan and T. Wu, Establishment of the standard operating procedure for gathering digital evidence, Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 56\u201365, 2005."},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"I. Lin, T. Lan and J. Wu, A research of information and communication security forensic mechanisms in Taiwan, Proceedings of the Thirty-Seventh International Carnahan Conference on Security Technology, pp. 23\u201329, 2003.","DOI":"10.1109\/CCST.2003.1297530"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"I. Lin, H. Yang, G. Gu and A. Lin, A study of information and communication security forensic technology capability in Taiwan, Proceedings of the Thirty-Seventh International Carnahan Conference on Security Technology, pp. 386\u2013393, 2003.","DOI":"10.1109\/CCST.2003.1297591"},{"key":"3_CR10","unstructured":"R. McKemmish, What is forensic computing? Trends and Issues in Crime and Criminal Justice, no. 118 (www.aic.gov.au\/publications \/tandi\/ti118.pdf), 2002."},{"key":"3_CR11","unstructured":"M. Meyers and M. Rogers, Computer forensics: The need for standardization and certification, International Journal of Digital Evidence, vol. 3(2), 2004."},{"key":"3_CR12","volume-title":"Computer and Intrusion Forensics","author":"G. Mohay","year":"2003","unstructured":"G. Mohay, A. Anderson, B. Collie, O. de Vel and R. McKemmish, Computer and Intrusion Forensics, Artech House, Norwood, Massachusetts, 2003."},{"key":"3_CR13","unstructured":"G. Palmer, A road map for digital forensic research, Proceedings of the 2001 Digital Forensic Research Workshop, 2001."},{"key":"3_CR14","unstructured":"L. Pan and L. Batten, Reproducibility of digital evidence in forensic investigations, Proceedings of the 2005 Digital Forensic Research Workshop, 2005."},{"key":"3_CR15","unstructured":"M. Pollitt, Computer forensics: An approach to evidence in cyberspace, Proceedings of the Eighteenth National Information Systems Security Conference, pp. 487\u2013491, 1995."},{"key":"3_CR16","unstructured":"M. Pollitt, Principles, practices and procedures: An approach to standards in computer forensics, Proceedings of the Second International Conference on Computer Evidence, pp. 10\u201315, 1995."},{"issue":"1","key":"3_CR17","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1080\/15567280701721921","volume":"2","author":"M. Pollitt","year":"2008","unstructured":"M. Pollitt, Digital orange juice, Journal of Digital Forensic Practice, vol. 2(1), pp. 54\u201356, 2008.","journal-title":"Journal of Digital Forensic Practice"},{"key":"3_CR18","unstructured":"M. Reith, C. Carr and G. Gunsch, An examination of digital forensic models, International Journal of Digital Evidence, vol. 1(3), 2002."},{"issue":"4","key":"3_CR19","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/j.diin.2004.11.005","volume":"1","author":"M. Solon","year":"2004","unstructured":"M. Solon and P. Harper, Preparing evidence for court, Digital Investigation, vol. 1(4), pp. 279\u2013283, 2004.","journal-title":"Digital Investigation"},{"key":"3_CR20","unstructured":"P. Stephenson, Modeling of post-incident root cause analysis, International Journal of Digital Evidence, vol. 2(2), 2003."},{"key":"3_CR21","first-page":"171","volume-title":"Handbook of Forensic Services","author":"K. Waggoner","year":"2007","unstructured":"K. Waggoner (Ed.), Crime scene search, in Handbook of Forensic Services, Federal Bureau of Investigation, Quantico, Virginia, pp. 171\u2013184, 2007."},{"issue":"4","key":"3_CR22","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/MSECP.2003.1219052","volume":"1","author":"A. Yasinsac","year":"2003","unstructured":"A. Yasinsac, R. Erbacher, D. Marks, M. Pollitt and P. Sommer, Computer forensics education, IEEE Security and Privacy, vol. 1(4), pp. 15\u201323, 2003.","journal-title":"IEEE Security and Privacy"}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics V"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04155-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T19:30:14Z","timestamp":1552159814000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04155-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642041549","9783642041556"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04155-6_3","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}