{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T05:26:26Z","timestamp":1740547586519,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642157653"},{"type":"electronic","value":"9783642157660"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15766-0_21","type":"book-chapter","created":{"date-parts":[[2010,9,2]],"date-time":"2010-09-02T20:41:05Z","timestamp":1283460065000},"page":"142-147","source":"Crossref","is-referenced-by-count":6,"title":["A Framework for Network Forensic Analysis"],"prefix":"10.1007","author":[{"given":"Emmanuel S.","family":"Pilli","sequence":"first","affiliation":[]},{"given":"Ramesh C.","family":"Joshi","sequence":"additional","affiliation":[]},{"given":"Rajdeep","family":"Niyogi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","unstructured":"New York Times, Cyber attack on Google Said to Hit Password System, http:\/\/www.nytimes.com\/2010\/04\/20\/technology\/20google.html"},{"key":"21_CR2","unstructured":"Washington Post, Google threatens to leave China after attacks on activists\u2019 e-mail, http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2010\/01\/12\/AR2010011203024.html"},{"key":"21_CR3","unstructured":"Palmer, G.: A Road Map for Digital Forensic Research. In: 1st Digital Forensic Research Workshop, pp. 27\u201330 (2001)"},{"key":"21_CR4","volume-title":"The investigative process. Digital evidence and computer crime","author":"E. Casey","year":"2004","unstructured":"Casey, E., Palmer, G.: The investigative process. Digital evidence and computer crime. Elsevier Academic Press, Amsterdam (2004)"},{"issue":"2","key":"21_CR5","first-page":"1","volume":"2","author":"B. Carrier","year":"2003","unstructured":"Carrier, B., Spafford, E.H.: Getting physical with the digital investigation process. Int\u2019l J. of Dig. Evidence.\u00a02(2), 1\u201320 (2003)","journal-title":"Int\u2019l J. of Dig. Evidence."},{"key":"21_CR6","unstructured":"Ciardhuain, S.O.: An extended Model of Cybercrime Investigations. Int\u2019l J. of Dig. Evidence\u00a03(1) (2004)"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Ren, W., Jin, H.: Modeling the network forensics behaviors. In: 1st Int\u2019l Conf. Security and Privacy for Emerging Areas in Comm. Networks. pp. 1\u20138 (2005)","DOI":"10.1109\/SECCMW.2005.1588287"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Pilli, E.S., Joshi, R.C., Niyogi, R.: Network forensic frameworks: Survey and research challenges. Dig. Investigation (Int\u2019l. J. Dig. Investigation 2010) (in Press)","DOI":"10.1016\/j.diin.2010.02.003"},{"key":"21_CR9","unstructured":"Yasinsac, A., Manzano, Y.: Honeytraps, a network forensic tool. In: 6th Multi-Conf. on Systemics, Cybernetics and Informatics, Florida, USA (2002)"},{"key":"21_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-45215-7_1","volume-title":"Computer Network Security","author":"K. Shanmugasundaram","year":"2003","unstructured":"Shanmugasundaram, K., et al.: ForNet: A distributed forensics network. In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. LNCS, vol.\u00a02776, pp. 1\u201316. Springer, Heidelberg (2003)"},{"key":"21_CR11","unstructured":"Ren, W.: On the Reference Model of Distributed Cooperative Network Forensics System. In: 6th Int\u2019l Conf. Information Integration and Web-based Application & Services, Jakarta, Indonesia, pp. 771\u2013775 (2004)"},{"key":"21_CR12","series-title":"Lecture Notes in Computer Science","first-page":"175","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2004","author":"J. Kim","year":"2004","unstructured":"Kim, J., Kim, M., Noh, B.N.: A Fuzzy Expert System for Network Forensics. In: Lagan\u00e1, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol.\u00a03043, pp. 175\u2013182. Springer, Heidelberg (2004)"},{"key":"21_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/978-3-540-30582-8_7","volume-title":"Information Networking","author":"A. Almulhem","year":"2005","unstructured":"Almulhem, A., Traore, I.: Experience with Engineering a Network Forensics System. In: Kim, C. (ed.) ICOIN 2005. LNCS, vol.\u00a03391, pp. 62\u201371. Springer, Heidelberg (2005)"},{"issue":"3","key":"21_CR14","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/j.diin.2006.08.012","volume":"3","author":"B.J. Nikkel","year":"2006","unstructured":"Nikkel, B.J.: A portable network forensic evidence collector. Dig. Investigation (Int\u2019l. J. Dig. Investigation)\u00a03(3), 127\u2013135 (2006)","journal-title":"Dig. Investigation (Int\u2019l. J. Dig. Investigation)"},{"key":"21_CR15","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/11596981_36","volume-title":"Computational Intelligence and Security","author":"J. Tian","year":"2005","unstructured":"Tian, J., Zhao, W., Du, R.: D-S Evidence Theory and Its Data Fusion Application in Intrusion Detection. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol.\u00a03802, pp. 244\u2013251. Springer, Heidelberg (2005)"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Fong, E., Okun, V.: Web Application Scanners: Definitions and Functions. In: 40th Ann. Hawaii Int\u2019l Conf. on Sys. Sciences, Hawaii, p. 280b (2007)","DOI":"10.1109\/HICSS.2007.611"},{"key":"21_CR17","unstructured":"Sekar, V., et al.: Toward a Framework for Internet Forensic Analysis. In: ACM SIGCOMM Third Workshop on Hot Topics in Networks, HotNets (2004)"},{"issue":"2","key":"21_CR18","first-page":"32","volume":"13","author":"M. Ponec","year":"2010","unstructured":"Ponec, M., et al.: New payload attribution methods for network forensic investigations. ACM Trans. Info. Syst. Security\u00a013(2), 32 (2010) Article 15","journal-title":". ACM Trans. Info. Syst. Security"}],"container-title":["Communications in Computer and Information Science","Information and Communication Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15766-0_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T13:42:33Z","timestamp":1740490953000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15766-0_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642157653","9783642157660"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15766-0_21","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}