{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T11:31:02Z","timestamp":1725622262736},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642236013"},{"type":"electronic","value":"9783642236020"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23602-0_4","type":"book-chapter","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T00:31:35Z","timestamp":1318897895000},"page":"40-52","source":"Crossref","is-referenced-by-count":3,"title":["Using Relationship-Building in Event Profiling for Digital Forensic Investigations"],"prefix":"10.1007","author":[{"given":"Lynn M.","family":"Batten","sequence":"first","affiliation":[]},{"given":"Lei","family":"Pan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Abraham, T., de Vel, O.: Investigative Profiling with Computer Forensic Log Data and Association Rules. In: Proceedings of the 2002 IEEE International Conference on Data Mining, pp. 11\u201318 (2002)","DOI":"10.1109\/ICDM.2002.1183880"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Imielinski, T., Swami, A.: Mining Association Rules between Sets of Items in Large Databases. In: Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, pp. 207\u2013216 (1993)","DOI":"10.1145\/170035.170072"},{"key":"4_CR3","unstructured":"Carrier, B.: File System Forensic Analysis. Upper Saddle River, Addison-Wesley (2005)"},{"key":"4_CR4","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.diin.2006.06.007","volume":"3","author":"S.L. Garfinkel","year":"2006","unstructured":"Garfinkel, S.L.: Forensic Feature Extraction and Cross-Drive Analysis. Digital Investigation\u00a03, 71\u201381 (2006)","journal-title":"Digital Investigation"},{"key":"4_CR5","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.diin.2004.03.001","volume":"1","author":"P. Gladyshev","year":"2004","unstructured":"Gladyshev, P., Patel, A.: Finite State Machine Approach to Digital Event Reconstruction. Digital Investigation\u00a01, 130\u2013149 (2004)","journal-title":"Digital Investigation"},{"key":"4_CR6","volume-title":"Topics in Algebra","author":"I.N. Herstein","year":"1975","unstructured":"Herstein, I.N.: Topics in Algebra, 2nd edn. Wiley, New York (1975)","edition":"2"},{"key":"4_CR7","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/978-3-540-77368-9_31","volume-title":"Advances in Hybrid Information Technology","author":"H.-U. Hwang","year":"2007","unstructured":"Hwang, H.-U., Kim, M.-S., Noh, B.-N.: Expert System Using Fuzzy Petri Nets in Computer Forensics. In: Szczuka, M.S., Howard, D., \u015ale\u0327zak, D., Kim, H.-k., Kim, T.-h., Ko, I.-s., Lee, G., Sloot, P.M.A. (eds.) ICHIT 2006. LNCS (LNAI), vol.\u00a04413, pp. 312\u2013322. Springer, Heidelberg (2007)"},{"key":"4_CR8","series-title":"Advances in Digital Forensics IV","first-page":"275","volume-title":"Proceedings of IFIP International Federation for Information Processing","author":"M. Kwan","year":"2008","unstructured":"Kwan, M., Chow, K.-P., Law, F., Lai, P.: Reasoning about Evidence Using Bayesian Networks. In: Proceedings of IFIP International Federation for Information Processing. Advances in Digital Forensics IV, vol.\u00a0285, pp. 275\u2013289. Springer, Heidelberg (2008)"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Liu, Z., Wang, N., Zhang, H.: Inference Model of Digital Evidence based on cFSA. In: Proceedings IEEE International Conference on Multimedia Information Networking and Security, pp. 494\u2013497 (2009)","DOI":"10.1109\/MINES.2009.72"},{"key":"4_CR10","unstructured":"Marrington, A., Mohay, G., Morarji, H., Clark, A.: Computer Profiling to Assist Computer Forensic Investigations. In: Proceedings of RNSA Recent Advances in Security Technology, pp. 287\u2013301 (2006)"},{"key":"4_CR11","unstructured":"Marrington, A., Mohay, G., Morarji, H., Clark, A.: Event-based Computer Profiling for the Forensic Reconstruction of Computer Activity. In: Proceedings of AusCERT 2007, pp. 71\u201387 (2007)"},{"key":"4_CR12","unstructured":"Marrington, A.: Computer Profiling for Forensic Purposes. PhD thesis, QUT, Australia (2009)"},{"key":"4_CR13","first-page":"79","volume-title":"Proceedings of 3rd International Conference on Malware 2008","author":"R. Tian","year":"2008","unstructured":"Tian, R., Batten, L., Versteeg, S.: Function Length as a Tool for Malware Classification. In: Proceedings of 3rd International Conference on Malware 2008, pp. 79\u201386. IEEE Computer Society, Los Alamitos (2008)"},{"key":"4_CR14","volume-title":"Matroid Theory","author":"D.J.A. Welsh","year":"1976","unstructured":"Welsh, D.J.A.: Matroid Theory. Academic Press, London (1976)"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/978-3-540-89856-6_16","volume-title":"Middleware 2008","author":"J. Wolf","year":"2008","unstructured":"Wolf, J., Bansal, N., Hildrum, K., Parekh, S., Rajan, D., Wagle, R., Wu, K.-L., Fleischer, L.K.: SODA: An Optimizing Scheduler for Large-Scale Stream-Based Distributed Computer Systems. In: Issarny, V., Schantz, R. (eds.) Middleware 2008. LNCS, vol.\u00a05346, pp. 306\u2013325. Springer, Heidelberg (2008)"},{"issue":"4","key":"4_CR16","first-page":"319","volume":"12","author":"S. Yu","year":"2008","unstructured":"Yu, S., Zhou, W., Doss, R.: Information Theory Based Detection against Network Behavior Mimicking DDoS Attacks. IEEE Communication Letters\u00a012(4), 319\u2013321 (2008)","journal-title":"IEEE Communication Letters"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Forensics in Telecommunications, Information, and Multimedia"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23602-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T19:01:03Z","timestamp":1555095663000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23602-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642236013","9783642236020"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23602-0_4","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2011]]}}}