{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:21:23Z","timestamp":1725578483482},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642195129"},{"type":"electronic","value":"9783642195136"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19513-6_10","type":"book-chapter","created":{"date-parts":[[2011,3,6]],"date-time":"2011-03-06T20:58:50Z","timestamp":1299445130000},"page":"120-128","source":"Crossref","is-referenced-by-count":2,"title":["An Architecture for the Forensic Analysis of Windows System Artifacts"],"prefix":"10.1007","author":[{"given":"Noor","family":"Hashim","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Iain","family":"Sutherland","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Anson, S., Bunting, S.: Mastering Windows Network Forensics and Investigation, Indiana (2007)"},{"key":"10_CR2","unstructured":"Brown, R., Palm, B., de Vel, O.: Design of a Digital Forensics Image Mining System (2005), \n                  \n                    http:\/\/www.springerlink.com\/content\/3a7t7cxk3mdrajb0\/"},{"key":"10_CR3","unstructured":"Caloyannides, M.A.: Computer Forensics and Privacy, Boston (2001)"},{"key":"10_CR4","unstructured":"Carrier, B.: File System Forensic Analysis, Indiana (2005)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Carvey, H.: Windows Forensic Analysis DVD Toolkit, Burlington (2007)","DOI":"10.1016\/B978-159749156-3\/50007-1"},{"key":"10_CR6","unstructured":"Casey, E.: Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet, Boston (2004)"},{"key":"10_CR7","unstructured":"Hay, S.A.: Windows File Analyzer Guidance (2005), \n                  \n                    http:\/\/www.mitec.cz\/Downloads\/WFA%20Guidance.pdf"},{"key":"10_CR8","unstructured":"Jones, K.J.: Forensic Analysis of Internet Explorer Activity Files, Forensic Analysis of Microsoft Windows Recycle Bin Records (2003)"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Lee, S., Savoldi, A., Lee, S., Lim, J.: Windows Pagefile Collection and Analysis for a Live Forensics Context. J. Future Gen. Comm. and Net.\u00a02, December 6-8 (2007)","DOI":"10.1109\/FGCN.2007.236"},{"key":"10_CR10","unstructured":"Mandia, K., Prosise, C., Pepe, M.: Incident Response & Computer Forensics, New York (2003)"},{"key":"10_CR11","unstructured":"Microsoft TechNet: Fundamental Computer Investigation Guide For Windows: Overview (2007)"},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.diin.2007.06.012","volume":"4S","author":"R. Murphey","year":"2007","unstructured":"Murphey, R.: Automated Windows event log forensics. J. Digital Investigation\u00a04S, S92\u2013S100 (2007)","journal-title":"J. Digital Investigation"},{"key":"10_CR13","unstructured":"Nelson, B., Phillips, A., Enfinger, F., Steuart, C.: Guide to Computer Forensics and Investigations (2008)"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Ruff, N.: Windows Memory Forensics. J. Computer Virology 4S, S92-S100. The British Library (2007)","DOI":"10.1007\/s11416-007-0070-0"},{"key":"10_CR15","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.diin.2006.06.010","volume":"3S","author":"A. Schuster","year":"2006","unstructured":"Schuster, A.: Searching For Processes And Threats In Microsoft Windows Memory Dump. J. Digital Investigation\u00a03S, S10\u2013S16 (2006)","journal-title":"J. Digital Investigation"},{"key":"10_CR16","unstructured":"The NT Insider: Windows NT Virtual Memory. Open System Resources. V. 5, I. 2 (1998), \n                  \n                    http:\/\/www.osronline.com\/custom.cfm?name=articlePrint.cfm&id=60"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19513-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T06:05:48Z","timestamp":1558418748000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19513-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642195129","9783642195136"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19513-6_10","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2011]]}}}