{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:21:29Z","timestamp":1725578489043},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642195129"},{"type":"electronic","value":"9783642195136"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19513-6_13","type":"book-chapter","created":{"date-parts":[[2011,3,6]],"date-time":"2011-03-06T20:58:50Z","timestamp":1299445130000},"page":"149-156","source":"Crossref","is-referenced-by-count":5,"title":["Semantic Modelling of Digital Forensic Evidence"],"prefix":"10.1007","author":[{"given":"Damir","family":"Kahved\u017ei\u0107","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tahar","family":"Kechadi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Bunting, S.: EnCase Computer Forensics: EnCe The Official EnCase Certified Examiner Study Guide, 2nd edn., Sybex (2008)"},{"key":"13_CR2","unstructured":"Pellet, \n                  \n                    http:\/\/clarkparsia.com\/pellet\/\n                  \n                  \n                 (visited: May 2010)"},{"key":"13_CR3","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.diin.2009.06.010","volume":"6","author":"M. Cohen","year":"2009","unstructured":"Cohen, M., Garfinkel, S., Schatz, B.: Extending the advanced forensic format to accommodate multiple data sources, logical evidence, arbitrary information and forensic workflow. Digital Investigation\u00a06, 57\u201368 (2009)","journal-title":"Digital Investigation"},{"key":"13_CR4","unstructured":"Encase, \n                  \n                    http:\/\/www.guidancesoftware.com\/\n                  \n                  \n                 (visited: May 2010)"},{"key":"13_CR5","volume-title":"Research Advances in Digital Forensics (2nd Ann. IFIP WG 11.9 Int. Conf. on Digital Forensics)","author":"S.L. Garfinkel","year":"2006","unstructured":"Garfinkel, S.L., Malan, D.J., Dubec, K.A., Stevens, C.C., Pham, C.: Disk imaging with the advanced forensic format, library and tools. In: Research Advances in Digital Forensics (2nd Ann. IFIP WG 11.9 Int. Conf. on Digital Forensics). Springer, Heidelberg (2006)"},{"key":"13_CR6","doi-asserted-by":"publisher","first-page":"907","DOI":"10.1006\/ijhc.1995.1081","volume":"43","author":"T.R. Gruber","year":"1995","unstructured":"Gruber, T.R.: Toward principles for the design of ontologies used for knowledge sharing. Int. Jrnl. of Human-Computer Studies\u00a043, 907\u2013928 (1995)","journal-title":"Int. Jrnl. of Human-Computer Studies"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Kahved\u017ei\u0107, D., Kechadi, T.: Extraction and Categorisation of User Activity from Windows Restore Points. Jrnl. of Digital Forensics, Security and Law\u00a04 (2008)","DOI":"10.15394\/jdfsl.2008.1049"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Kahved\u017ei\u0107, D., Kechadi, T.: Correlating Orphaned Windows Registry Data Structures. In: ADFSL 2009, Proc. of the Conf. on Digital Forensics, Security and Law, pp. 67\u201381 (2009)","DOI":"10.15394\/jdfsl.2009.1057"},{"key":"13_CR9","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.diin.2009.06.014","volume":"6","author":"D. Kahved\u017ei\u0107","year":"2009","unstructured":"Kahved\u017ei\u0107, D., Kechadi, T.: DIALOG: A Framework for Modelling, Analysis and Reuse of Digital Forensic Knowledge. Digital Investigation\u00a06, 23\u201333 (2009)","journal-title":"Digital Investigation"},{"key":"13_CR10","unstructured":"Semantic Web Case Studies and Use Cases, \n                  \n                    http:\/\/www.w3.org\/2001\/sw\/sweo\/public\/UseCases\/\n                  \n                  \n                 (visited: May 2010)"},{"key":"13_CR11","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/219717.219748","volume":"38","author":"G.A. Miller","year":"1995","unstructured":"Miller, G.A.: WordNet: A Lexical Database for English. Comm. of the ACM\u00a038, 39\u201341 (1995)","journal-title":"Comm. of the ACM"},{"key":"13_CR12","unstructured":"Schatz, B., Clark, A.: An open architecture for digital evidence integration. In: Proc of the 2006 AusCERT Asia Pacific Information Technology Security Conference R&D Stream, pp. 15\u201329 (2006)"},{"key":"13_CR13","unstructured":"Prot\u00e9g\u00e9 Ontology Editor and Knowledge Acquisition System, \n                  \n                    http:\/\/protege.stanford.edu\/\n                  \n                  \n                 (visited: May 2010)"},{"key":"13_CR14","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.diin.2007.01.002","volume":"4","author":"P. Turner","year":"2007","unstructured":"Turner, P.: Applying a forensic approach to incident response, network investigation and system administration using digital evidence bags. Digital Investigation\u00a04, 30\u201335 (2007)","journal-title":"Digital Investigation"},{"key":"13_CR15","unstructured":"Time Ontology in OWL, \n                  \n                    http:\/\/www.w3.org\/TR\/2006\/WD-owl-time-20060927\/\n                  \n                  \n                 (visited: May 2010)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19513-6_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T05:55:38Z","timestamp":1558418138000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19513-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642195129","9783642195136"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19513-6_13","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2011]]}}}