{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T11:42:57Z","timestamp":1725709377565},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642339615"},{"type":"electronic","value":"9783642339622"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33962-2_9","type":"book-chapter","created":{"date-parts":[[2012,12,8]],"date-time":"2012-12-08T04:51:33Z","timestamp":1354942293000},"page":"129-142","source":"Crossref","is-referenced-by-count":6,"title":["Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones"],"prefix":"10.1007","author":[{"given":"Junbin","family":"Fang","sequence":"first","affiliation":[]},{"given":"Zoe","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Kam-Pui","family":"Chow","sequence":"additional","affiliation":[]},{"given":"Siu-Ming","family":"Yiu","sequence":"additional","affiliation":[]},{"given":"Lucas","family":"Hui","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Mengfei","family":"He","sequence":"additional","affiliation":[]},{"given":"Yanbin","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"BreakPoint Software, Hex Workshop Hex Editor (\n                    \n                      www.hexworkshop.com\n                    \n                    \n                  )."},{"issue":"1","key":"9_CR2","first-page":"1","volume":"1","author":"M. Breeuwsma","year":"2007","unstructured":"M. Breeuwsma, M. de Jongh, C. Klaver, R. van der Knijff and M. Roeloffs, Forensic data recovery from flash memory, Small Scale Digital Device Forensics Journal, vol. 1(1), pp. 1\u201317, 2007.","journal-title":"Small Scale Digital Device Forensics Journal"},{"issue":"6","key":"9_CR3","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/MSP.2006.148","volume":"4","author":"V. Gratzer","year":"2006","unstructured":"V. Gratzer and D. Naccache, Cryptography, law enforcement and mobile communications, IEEE Security and Privacy, vol. 4(6), pp. 67\u201370, 2006.","journal-title":"IEEE Security and Privacy"},{"issue":"3\/4","key":"9_CR4","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.diin.2010.02.001","volume":"6","author":"C. Klaver","year":"2010","unstructured":"C. Klaver, Windows Mobile advanced forensics, Digital Investigation, vol. 6(3\/4), pp. 147\u2013167, 2010.","journal-title":"Digital Investigation"},{"key":"9_CR5","unstructured":"P. McCarthy, Forensic Analysis of Mobile Phones, Bachelor\u2019s Thesis, School of Computer and Information Science, University of South Australia, Mawson Lakes, Australia, 2005."},{"key":"9_CR6","unstructured":"MediaTek, Product lines, Hsinchu City, Taiwan (\n                    \n                      www.mediatek.com\/en\/index.php\n                    \n                    \n                  )."},{"key":"9_CR7","volume-title":"Proceedings of Southern African Telecommunication Networks and Applications Conference","author":"P. Mokhonoana","year":"2007","unstructured":"P. Mokhonoana and M. Olivier, Acquisition of a Symbian smartphone\u2019s content with an on-phone forensic tool, Proceedings of Southern African Telecommunication Networks and Applications Conference, 2007."},{"issue":"1","key":"9_CR8","first-page":"1","volume":"2","author":"S. Punja","year":"2008","unstructured":"S. Punja and R. Mislan, Mobile device analysis, Small Scale Digital Device Forensics Journal, vol. 2(1), pp. 1\u201316, 2008.","journal-title":"Small Scale Digital Device Forensics Journal"},{"key":"9_CR9","unstructured":"Spreadtrum Communications, Overview, Shanghai, China (\n                    \n                      www.spreadtrum.com\/en\/products\/products_overview\n                    \n                    \n                  )."},{"issue":"S","key":"9_CR10","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.diin.2011.05.003","volume":"8","author":"T. Vidas","year":"2011","unstructured":"T. Vidas, C. Zhang and N. Christin, Toward a general collection methodology for Android devices, Digital Investigation, vol. 8(S), pp. S14\u2013S24, 2011.","journal-title":"Digital Investigation"},{"key":"9_CR11","unstructured":"R. Wauters, Worldwide mobile phone market grew 20% in Q1 2011, fueled by smartphone boom, techcrunch.com, April 28, 2011."},{"key":"9_CR12","first-page":"191","volume-title":"Advances in Digital Forensics","author":"S. Willassen","year":"2005","unstructured":"S. Willassen, Forensic analysis of mobile phone internal memory, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 191\u2013204, 2005."},{"key":"9_CR13","first-page":"34","volume":"11","author":"Z. Zhang","year":"2010","unstructured":"Z. Zhang, The research of MTK mobile phones flash file system recovery, Netinfo Security, issue 11, pp. 34\u201336, 2010.","journal-title":"Netinfo Security"}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics VIII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33962-2_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:27:35Z","timestamp":1620131255000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33962-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642339615","9783642339622"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33962-2_9","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2012]]}}}