{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:21:29Z","timestamp":1725578489209},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642195129"},{"type":"electronic","value":"9783642195136"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19513-6_7","type":"book-chapter","created":{"date-parts":[[2011,3,7]],"date-time":"2011-03-07T01:58:50Z","timestamp":1299463130000},"page":"78-95","source":"Crossref","is-referenced-by-count":4,"title":["Defining a Standard for Reporting Digital Evidence Items in Computer Forensic Tools"],"prefix":"10.1007","author":[{"given":"Hamda","family":"Bariki","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mariam","family":"Hashmi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ibrahim","family":"Baggili","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"The Common Evidence Format Working Group (Carrier, B., Casey, E, Garfinkel, S., Kornblum, J., Hosmer, C., Rogers, M., Turner, P.): Standardizing Digital Evidence Storage. Communications of the ACM (February 2006)","DOI":"10.1145\/1113034.1113071"},{"key":"7_CR2","volume-title":"Mastering Windows Network Forensics and Investigation","author":"S. Anson","year":"2007","unstructured":"Anson, S., Bunting, S.: Mastering Windows Network Forensics and Investigation. Wiley Publishing, Inc., Canada (2007)"},{"key":"7_CR3","unstructured":"Devine, J.: The Importance of the Chain of Custody (October 30, 2009), \n                  \n                    http:\/\/ezinearticles.com\/?The-Importance-of-the-Chain-of-Custody&id=3182472\n                  \n                  \n                 (retrieved March 18, 2010)"},{"key":"7_CR4","unstructured":"Garfinkel, S., Malan, S., Dubec, K., Stevens, C., Pham, C.: Disk Imaging with the Advanced Forensics Format, Library and Tools. In: The Second Annual IFIP WG 11.9 International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, USA, January 29-February 1 (2006)"},{"key":"7_CR5","unstructured":"Glendale, D.: Guidance Software EnCase (2010), retrieved from \n                  \n                    http:\/\/www.digitalintelligence.com\/software\/guidancesoftware\/encase\/"},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.diin.2009.06.011","volume":"6","author":"B. Levine","year":"2009","unstructured":"Levine, B., Liberatore, M.: DEX: Digital evidence provenance supporting reproducibility and comparison. Digital Investigation\u00a06, S48\u2013S56 (2009)","journal-title":"Digital Investigation"},{"key":"7_CR7","unstructured":"Liquid Technologies Limited: Liquid XML Studio 2010 (version 8.1.2.2399), [Software] available from \n                  \n                    http:\/\/www.liquid-technologies.com\/"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Marcella, A.J., Menendez Jr., D.: Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes. In: Information Security, 2nd edn. Auerbach publications, Taylor & Francis Group (2007)","DOI":"10.1201\/9780849383298"},{"key":"7_CR9","volume-title":"Guide to Computer Forensics and Investigations","author":"B. Nelson","year":"2008","unstructured":"Nelson, B., Phillips, A., Enfringer, F., Steuart, C.: Guide to Computer Forensics and Investigations. GEX Publishing Services, Canada (2008)"},{"key":"7_CR10","unstructured":"Petruzzi, J.: How to Keep a Digital Chain of Custody (December 01, 2005), retrieved from \n                  \n                    http:\/\/www.csoonline.com\/article\/220718\/How_to_Keep_a_Digital_Chain_of_Custody"},{"key":"7_CR11","volume-title":"Computer Forensics Procedures, Tools, and Digital Evidence Bags: What They Are and Who Should Use Them","author":"B. Pladna","year":"2008","unstructured":"Pladna, B.: Computer Forensics Procedures, Tools, and Digital Evidence Bags: What They Are and Who Should Use Them. East Carolina University, East Carolina (2008)"},{"key":"7_CR12","unstructured":"ProDiscover. (n.d.) Technology Pathways, \n                  \n                    http:\/\/www.techpathways.com\/DesktopDefault.aspx?tabindex=3&tabid=12\n                  \n                  \n                 (retrieved February 22, 2010)"},{"key":"7_CR13","unstructured":"Rand, A., Loftus, T.: Chain of Custody Procedure (2003), retrieved from \n                  \n                    http:\/\/www.lagoonsonline.com\/laboratory-articles\/custody.htm"},{"key":"7_CR14","unstructured":"Steen, S., Hassell, J.: Computer Forensics 101 (October 2004), retrieved from \n                  \n                    http:\/\/www.expertlaw.com\/library\/forensic_evidence\/computer_forensics_101.html"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19513-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T09:57:21Z","timestamp":1558432641000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19513-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642195129","9783642195136"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19513-6_7","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2011]]}}}