{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T04:46:06Z","timestamp":1725597966830},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642227080"},{"type":"electronic","value":"9783642227097"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22709-7_54","type":"book-chapter","created":{"date-parts":[[2011,7,25]],"date-time":"2011-07-25T16:13:09Z","timestamp":1311610389000},"page":"552-561","source":"Crossref","is-referenced-by-count":3,"title":["BlackBerry Forensics: An Agent Based Approach for Database Acquisition"],"prefix":"10.1007","author":[{"given":"Satheesh Kumar","family":"Sasidharan","sequence":"first","affiliation":[]},{"given":"K. L.","family":"Thomas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"54_CR1","doi-asserted-by":"crossref","unstructured":"Jansen, W., Ayers, R.: Guidelines on cell phone forensics, National Institute of Standards and Technology, Special Publication 800-101 (2007)","DOI":"10.6028\/NIST.SP.800-101"},{"key":"54_CR2","doi-asserted-by":"crossref","unstructured":"Ayers, R., Jansen, W., Cilleros, N., Daniellou, R.: Cell phone forensic tools: An overview and analysis. Technical Report NISTIR 7250, National Institute of Standards and Technology (2005)","DOI":"10.6028\/NIST.IR.7250"},{"key":"54_CR3","unstructured":"Carrier, B.: Defining Digital Forensic Examination and Analysis Tools. In: Digital Forensics Research Workshop II (August 2002)"},{"issue":"4","key":"54_CR4","first-page":"266","volume":"1","author":"B. Mellars","year":"2004","unstructured":"Mellars, B.: Forensic Examination of Mobile Phones. Digital Investigation. The International Journal of Digital Forensics & Incident Response\u00a01(4), 266\u2013272 (2004)","journal-title":"The International Journal of Digital Forensics & Incident Response"},{"key":"54_CR5","unstructured":"Punja, C.S.: BlackBerry Forensics, Mobile Forensics World Conference, Chicago: Calgary Police Service, Technological Crimes Team (2009)"},{"key":"54_CR6","series-title":"Mobile Forensics World","volume-title":"Cell Phone Analysis: Technology, Tools, and Processes","author":"G. Kessler","year":"2010","unstructured":"Kessler, G.: Cell Phone Analysis: Technology, Tools, and Processes. Mobile Forensics World. Purdue University, Chicago (2010)"},{"issue":"3-4","key":"54_CR7","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.diin.2010.03.001","volume":"6","author":"R.P. Mislan","year":"2010","unstructured":"Mislan, R.P., Casey, E., Kessler, G.C.: The Growing Need for On-Scene Triage of Mobile Devices. Digital Investigation\u00a06(3-4), 112\u2013124 (2010)","journal-title":"Digital Investigation"},{"issue":"1","key":"54_CR8","first-page":"2","volume":"2","author":"S. Punja","year":"2008","unstructured":"Punja, S., Mislan, R.: Mobile Device Analysis. Small Scale Digital Device Forensics Journal\u00a02(1), 2\u20134 (2008)","journal-title":"Small Scale Digital Device Forensics Journal"},{"key":"54_CR9","unstructured":"McCarthy, P.: Forensic analysis of mobile phones. Master\u2019s thesis, University of South Australia (2005)"},{"key":"54_CR10","unstructured":"ABC Amber BlackBerry Converter from http:\/\/abc-amber-blackberry-converter.en.softonic.com\/"},{"key":"54_CR11","unstructured":"Ayers, R., Dankar, A., Mislan, R.: Hashing Techniques for Mobile Device Forensics. Small Scale Digital Device Forensics Journal, 1\u20136 (2009)"},{"key":"54_CR12","unstructured":"Research In Motion. (n.d.). BlackBerry Device Software Version 5.0, retrieved from http:\/\/us.blackberry.com\/apps-software\/devices\/"},{"key":"54_CR13","unstructured":"Harrington, M. (n.d.). IPD Files Demystified, retrieved from http:\/\/mobileforensics.wordpress.com\/category\/black-berry\/"},{"key":"54_CR14","unstructured":"Napieralski, B. (n.d.). How to Easily Process a BlackBerry Device, retrieved from http:\/\/www.mfi-training.com\/forum"},{"key":"54_CR15","unstructured":"BlackBerry Database details from, RIM KB Doc ID KB03974, http:\/\/www.blackberry.com"},{"key":"54_CR16","unstructured":"ACPO Good Practice Guide for Computer based Electronic Evidence, retrieved from http:\/\/cryptome.org\/acpo-guide.htm"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22709-7_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T09:17:50Z","timestamp":1560417470000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22709-7_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642227080","9783642227097"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22709-7_54","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}