{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:52:57Z","timestamp":1725594777430},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642225765"},{"type":"electronic","value":"9783642225772"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22577-2_59","type":"book-chapter","created":{"date-parts":[[2011,7,6]],"date-time":"2011-07-06T12:41:43Z","timestamp":1309956103000},"page":"435-441","source":"Crossref","is-referenced-by-count":4,"title":["Analysis of Digital Forensic Tools and Investigation Process"],"prefix":"10.1007","author":[{"given":"Seema","family":"Yadav","sequence":"first","affiliation":[]},{"given":"Khaleel","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Jayant","family":"Shekhar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"59_CR1","doi-asserted-by":"crossref","unstructured":"Worring, M., Cucchiara, R.: Multimedia in Forensics. In: Communication of the ACM, MM 2009, October 19\u201324, pp. 1153\u20131154 (2009)","DOI":"10.1145\/1631272.1631546"},{"key":"59_CR2","doi-asserted-by":"crossref","unstructured":"Yen, P.-H., Yang, C.-H., Ahn, T.-N.: Design and Implementation of a Live-analysis Digital Forensic System. In: Communication of the ACM in International Conference on Convergence and Hybrid Information Technology, pp. 239\u2013242 (2009)","DOI":"10.1145\/1644993.1645038"},{"key":"59_CR3","first-page":"64","volume":"7","author":"L. Simson","year":"2010","unstructured":"Simson, L., Garfinkel: Digital forensics research: The next 10 years. Digital Forensic Research Workshop in Science Direct, digital investigation\u00a07, 64\u201373 (2010)http\/\/doi:0.1016\/j.diin","journal-title":"Digital Forensic Research Workshop in Science Direct, digital investigation"},{"key":"59_CR4","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.diin.2009.06.008","volume":"6","author":"J. Olsson","year":"2009","unstructured":"Olsson, J., Boldt, M.: Computer forensic timeline visualization tool. Digital Forensic Research Workshop, digital investigation\u00a06, S78\u2013S87 (2009); http:\/\/ doi:10.1016\/j.diin","journal-title":"Digital Forensic Research Workshop, digital investigation"},{"key":"59_CR5","first-page":"1","volume-title":"Proceedings of the 42nd Hawaii International Conference on System Sciences","author":"K. Nance","year":"2009","unstructured":"Nance, K., Hay, B., Bishop, M.: Digital Forensics: Defining a Research Agenda. In: Proceedings of the 42nd Hawaii International Conference on System Sciences, pp. 1\u20136. IEEE computer society, Los Alamitos (2009)"},{"key":"59_CR6","unstructured":"Balon, N., Stovall, R., Scaria, T.: Computer Intrusion Forensics research paper, pp.1-24 (2002)"},{"key":"59_CR7","doi-asserted-by":"crossref","unstructured":"Aggarwal, S., Duan, Z., Kermes, L., de Medeiros, B.: E-Crime Investigative Technologies. In: Proceedings of the 41st Hawaii International Conference on System Science in IEEE, pp. 1\u201310 (2008)","DOI":"10.1109\/HICSS.2008.133"},{"key":"#cr-split#-59_CR8.1","doi-asserted-by":"crossref","unstructured":"Cohen, M.I.: PyFlag: PyFlag-An advanced network forensic framework. In: Communication of the ACM, digital investigation, 5th edn., pp. 112???120 (2008);","DOI":"10.1016\/j.diin.2008.05.016"},{"key":"#cr-split#-59_CR8.2","unstructured":"Digital Forensic Research Workshop, http:\/\/ doi: 10.1016\/ j.diin.2008.05.016"},{"key":"59_CR9","unstructured":"Crim, J.: Digital forensic tools and identifications, Information Security Analyst, Virginia Commonwealth University, available at Site, http:\/\/liveview.sourceforge.net"},{"key":"59_CR10","volume-title":"Proceedings of the International Conference on Information Technology Coding and Computing (ITCC 2004)","author":"P.G. Bradford","year":"2004","unstructured":"Bradford, P.G., Perdue, M.B.J.: Towards Proactive Computer-System Forensics. In: Proceedings of the International Conference on Information Technology Coding and Computing (ITCC 2004). IEEE computer Society, Los Alamitos (2004)"},{"key":"59_CR11","unstructured":"Carrier, B.: Defining Digital Forensics Examination and Analysis Tools Using Abstraction Layers. International Journal of Digital Evidence\u00a01(4) (2003), http:\/\/www.ijde.org\/docs\/02_winter_art2.pdf"},{"key":"59_CR12","unstructured":"Carrier, B.: Open Source Digital Forensics Tools. The Legal Argument1, as a stake search Report pp.1-11 (2002), www.atstake.com\/researchreports\/acrobat\/atstake_opensource_forensics.Pdf"},{"key":"59_CR13","unstructured":"Carrier, B.: Defining Digital Forensics Examination and Analysis Tools. In: Digital Research Workshop II (2002), http:\/\/www.dfrws.org\/dfrws\/papers\/Papers\/Briancarrier.pdf"}],"container-title":["Communications in Computer and Information Science","High Performance Architecture and Grid Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22577-2_59","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T19:50:59Z","timestamp":1560369059000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22577-2_59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642225765","9783642225772"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22577-2_59","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}