{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T05:36:29Z","timestamp":1725600989117},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642232190"},{"type":"electronic","value":"9783642232206"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23220-6_65","type":"book-chapter","created":{"date-parts":[[2011,8,17]],"date-time":"2011-08-17T08:37:47Z","timestamp":1313570267000},"page":"513-522","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic Electronic Forensics Based on Plug-in"],"prefix":"10.1007","author":[{"given":"Yong","family":"Li","sequence":"first","affiliation":[]},{"given":"Wenqi","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"65_CR1","first-page":"78","volume":"10","author":"X.M. Zhao","year":"2003","unstructured":"Zhao, X.M., Chen, Q.: The research sotuanon and expectation of computer forensics. Computer Security\u00a010, 78\u201381 (2003)","journal-title":"Computer Security"},{"issue":"2","key":"65_CR2","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/BF00196791","volume":"3","author":"S. Haber","year":"1991","unstructured":"Haber, S., Stornetta, W.S.: How to time stamp a digital document. Journal of Cryptology\u00a03(2), 99\u2013111 (1991)","journal-title":"Journal of Cryptology"},{"key":"65_CR3","unstructured":"Palmer, G.: A road map for digital forensics research. Report From the First Digital Forensics Research Workshop, DFRWS (2001)"},{"issue":"3","key":"65_CR4","first-page":"1","volume":"1","author":"M. Reith","year":"2002","unstructured":"Reith, M., Carr, C., Gunsch, G.: An Exanmination of Digital Forensic Model. International Journal of Digital Evidence\u00a01(3), 1\u201312 (2002)","journal-title":"International Journal of Digital Evidence"},{"key":"65_CR5","unstructured":"Honing, A.: Adaptive model generation:an architecture for deploy of data mining based intrusion detection systems [EB\/OL] (2007-1-12), \n                    \n                      http:\/\/citeseer.ist.psu.edu\/"},{"key":"65_CR6","unstructured":"Yasinsac, A., Manzano, Y.: Honeytraps:A network forensic tool. In: Proc. of the 6th Word Multiconference on Systems,Cybernetics and Informatics (SCI 2002), Orlando, Florida, USA, pp. 1\u20136 (2002)"},{"issue":"1","key":"65_CR7","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.diin.2005.01.004","volume":"2","author":"E. Thompson","year":"2005","unstructured":"Thompson, E.: MD5 collisions and the impact on computer forensics. Digital Investigation\u00a02(1), 36\u201340 (2005)","journal-title":"Digital Investigation"},{"key":"65_CR8","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.diin.2004.07.003","volume":"1","author":"M.W. Stevens","year":"2004","unstructured":"Stevens, M.W.: Unification of relative time frames for digital forensics. Digital Investigation\u00a01, 225\u2013239 (2004)","journal-title":"Digital Investigation"}],"container-title":["Communications in Computer and Information Science","Applied Informatics and Communication"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23220-6_65","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,31]],"date-time":"2019-03-31T11:28:16Z","timestamp":1554031696000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23220-6_65"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642232190","9783642232206"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23220-6_65","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}