{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T04:26:55Z","timestamp":1744086415305,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642336775"},{"type":"electronic","value":"9783642336782"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33678-2_11","type":"book-chapter","created":{"date-parts":[[2012,9,6]],"date-time":"2012-09-06T15:02:42Z","timestamp":1346943762000},"page":"125-136","source":"Crossref","is-referenced-by-count":6,"title":["IT-Forensic Automotive Investigations on the Example of Route Reconstruction on Automotive System and Communication Data"],"prefix":"10.1007","author":[{"given":"Tobias","family":"Hoppe","sequence":"first","affiliation":[]},{"given":"Sven","family":"Kuhlmann","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Kiltz","sequence":"additional","affiliation":[]},{"given":"Jana","family":"Dittmann","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"SPIEGEL Online International: Autopsy Shows Haider Was Intoxicated, Web Article from (October 15, 2008), http:\/\/www.spiegel.de\/international\/europe\/0,1518,584382,00.html (last access: March 2, 2012)"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Nilsson, D.K., Larson, U.E.: Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks. In: Networking and Telecommunications: Concepts, Methodologies, Tools and Applications, pp. 647\u2013660. IGI Global (2010) ISBN 978-1-60566-986-1","DOI":"10.4018\/978-1-60566-986-1.ch041"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Biermann, M., Hoppe, T., Dittmann, J., Vielhauer, C.: Vehicle Systems: Comfort & Security Enhancement of Face\/Speech Fusion with Compensational Biometrics. In: MM&Sec 2008 - Proceedings of the Multimedia and Security Workshop 2008, Oxford, UK, September 22-23, pp. 185\u2013194. ACM (2008) ISBN 978-1-60558-058-6","DOI":"10.1145\/1411328.1411360"},{"key":"11_CR4","unstructured":"Dittmann, J., Hoppe, T., Kiltz, S., Tuchscheerer, T.: Elektronische Manipulation von Fahrzeug- und Infrastruktursystemen: Gef\u00e4hrdungspotentiale f\u00fcr die Stra\u00dfenverkehrssicherheit; Wirtschaftsverlag N. W. Verlag f\u00fcr neue Wissenschaft (2011) ISBN 978-3869181158"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Grance, T., Kent, K., Kim, B.: Computer incident handling guide, special publication 800-61. National Institute for Standards and Technology, NIST Special Publication 800-61 (2004)","DOI":"10.6028\/NIST.SP.800-61"},{"key":"11_CR6","unstructured":"Casey, E.: Digital Evidence and Computer Crime. Academic Press (2004) ISBN 0-12-1631044"},{"key":"11_CR7","unstructured":"Federal Office for Information Security: Leitfaden IT-Forensik, Version 1.0.1 (March 2011), http:\/\/www.bsi.bund.de\/ContentBSI\/Themen\/Cyber-Sicherheit\/ThemenCS\/IT-Forensik\/it-forensik.html"},{"key":"11_CR8","unstructured":"Kiltz, S., Hoppe, T., Dittmann, J., Vielhauer, C.: Video surveillance: A new forensic model for the forensically sound retrieval of picture content off a memory dump. In: Proceedings of Informatik 2009-Digitale Multimedia-Forensik, pp. 1619\u20131633 (2009)"},{"key":"11_CR9","unstructured":"Kiltz, S., Hildebrandt, M., Dittmann, J.: Forensische Datenarten und -analysen in automotiven Systemen. In: Horster, P., Schartner, P. (Hrsg.) D\u00b7A\u00b7CH Security 2009, Syssec, Bochum, May 19-20 (2009) ISBN: 978-3-00027-488-6"},{"key":"11_CR10","unstructured":"Hoppe, H., Holthusen, S., Tuchscheerer, S., Kiltz, S., Dittmann, J.: Sichere Datenhaltung im Automobil am Beispiel eines Konzepts zur forensisch sicheren Datenspeicherung. In: Sicherheit 2010. LNI P, vol. 170, pp. 153\u2013164 (2010) ISBN 978-3-88579-264-2"},{"issue":"6","key":"11_CR11","first-page":"226","volume":"4","author":"T. Hoppe","year":"2009","unstructured":"Hoppe, T., Kiltz, S., Dittmann, J.: Applying Intrusion Detection to Automotive IT \u2013 Early Insights and Remaining Challenges. Journal of Information Assurance and Security (JIAS)\u00a04(6), 226\u2013235 (2009) ISSN: 1554-1010","journal-title":"Journal of Information Assurance and Security (JIAS)"},{"key":"11_CR12","unstructured":"Hoppe, T., Exler, F., Dittmann, J.: IDS-Signaturen f\u00fcr automotive CAN-Netzwerke. In: Schartner, P., Taeger, J. (Hrsg.) D\u00b7A\u00b7CH Security 2011, Syssec, pp. 55\u201366 (2011) ISBN: 978-3-00-034960-7"},{"key":"11_CR13","first-page":"103","volume-title":"Automotive - Safety & Security 2010","author":"M. M\u00fcter","year":"2010","unstructured":"M\u00fcter, M., Hoppe, T., Dittmann, J.: Decision Model for Automotive Intrusion Detection Systems. In: Automotive - Safety & Security 2010, pp. 103\u2013116. Shaker Verlag, Aachen (2010) ISBN 978-3-8322-9172-3"},{"key":"11_CR14","unstructured":"Working state of a community-created CAN-ID matrix; forum discussion in the www.CANhack.de internet community, http:\/\/www.CANhack.de\/viewtopic.php?t=1017 , (last access: February 29, 2012)"},{"key":"11_CR15","unstructured":"Rehse, T.: Semantische Analyse von Navigationsger\u00e4ten und Abgleich von Daten aus dem Fahrzeugbussystem mit dem Ziel der Rekonstruktion von Fahrtrouten f\u00fcr den IT-forensischen Nachweis. Master thesis, Otto-von-Guericke-University of Magdeburg (2011)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33678-2_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T23:26:01Z","timestamp":1744068361000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33678-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642336775","9783642336782"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33678-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}