{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:21:21Z","timestamp":1725578481954},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642195129"},{"type":"electronic","value":"9783642195136"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19513-6_12","type":"book-chapter","created":{"date-parts":[[2011,3,7]],"date-time":"2011-03-07T01:58:50Z","timestamp":1299463130000},"page":"137-148","source":"Crossref","is-referenced-by-count":18,"title":["Forensic Data Carving"],"prefix":"10.1007","author":[{"given":"Digambar","family":"Povar","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"V. K.","family":"Bhadran","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Statistical Disk Cluster Classification for File Carving, Cor J. Veenman. Intelligent System Lab, Computer Science Institute, University of Amsterdam, Amsterdam"},{"issue":"2","key":"12_CR2","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/1113034.1113074","volume":"49","author":"G.G. Richard","year":"2006","unstructured":"Richard, G.G., Roussev, V.: Next-generation digital forensics. Communications of the ACM\u00a049(2), 76\u201380 (2006)","journal-title":"Communications of the ACM"},{"issue":"10","key":"12_CR3","doi-asserted-by":"publisher","first-page":"762","DOI":"10.1145\/359842.359859","volume":"20","author":"R.S. Boyer","year":"1977","unstructured":"Boyer, R.S., Moore, J.S.: A Fast String Searching Algorithm. Communications of the Association for Computing Machinery\u00a020(10), 762\u2013772 (1977)","journal-title":"Communications of the Association for Computing Machinery"},{"key":"12_CR4","unstructured":"Hamilton, E.: JPEG File Interchange Format, Version1.02.1 (September 1992)"},{"key":"12_CR5","unstructured":"Joint Photographic Experts Group, JPEG 2000 Specification (2004), \n                  \n                    http:\/\/www.jpeg.org\/jpeg2000\/\n                  \n                  \n                 (last visited February 2009)"},{"key":"12_CR6","unstructured":"Adobe Systems Incorporated, Portable Document Format Reference Manual Version 1.3 (March 11, 1999)"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Naval Postgraduate School Thesis, Monterey, California, Nicholas Mikus (March 2005)","DOI":"10.21236\/ADA433919"},{"key":"12_CR8","unstructured":"Digital Imaging Group, DIG2000 file format proposal, Appendix A (October 1998)"},{"key":"12_CR9","unstructured":"PKWARE Inc. ZIP File Format Specification Version: 6.2.0 (June 2004)"},{"key":"12_CR10","unstructured":"CompuServe Incorporated, Graphics Interchange Format(sm) (July 1990)"},{"key":"12_CR11","unstructured":"http:\/\/www.ntchosting.com\/multimedia\/gif-graphics-interchange-format.html\n                  \n                  \n                 (June 2009)"},{"key":"12_CR12","unstructured":"Sun Microsystems. OpenOffice, \n                  \n                    http:\/\/www.openoffice.org\/\n                  \n                  \n                 (last Visited December 2009)"},{"key":"12_CR13","unstructured":"Wouters, W.: BMP Format (February 1997)"},{"key":"12_CR14","unstructured":"http:\/\/www.forensicswiki.org\n                  \n                  \n                 (last visited: March 2010)"},{"key":"12_CR15","unstructured":"http:\/\/www.webopedia.com\n                  \n                  \n                 (last visited: March 2010)"},{"key":"12_CR16","unstructured":"http:\/\/www.pkware.com\/documents\/casestudies\/\n                  \n                  \n                 (last visited: January 2010)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19513-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T09:54:03Z","timestamp":1558432443000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19513-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642195129","9783642195136"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19513-6_12","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2011]]}}}