{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:51:20Z","timestamp":1755838280200},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341342"},{"type":"electronic","value":"9783642341359"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34135-9_23","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T08:08:15Z","timestamp":1347264495000},"page":"225-233","source":"Crossref","is-referenced-by-count":3,"title":["Towards Retrieving Live Forensic Artifacts in Offline Forensics"],"prefix":"10.1007","author":[{"given":"S.","family":"Dija","sequence":"first","affiliation":[]},{"given":"T. R.","family":"Deepthi","sequence":"additional","affiliation":[]},{"given":"C.","family":"Balan","sequence":"additional","affiliation":[]},{"given":"K. L.","family":"Thomas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Kleissner, P.: Hibernation File Attack, Spain (2010)","key":"23_CR1"},{"unstructured":"W32.Witty.Worm, \n                    \n                      http:\/\/www.securityresponse.symantec.com\/avcenter\/venc\/data\/w32.witty.worm.html","key":"23_CR2"},{"doi-asserted-by":"crossref","unstructured":"Okolica, J., Peterson, G.L.: Windows operating systems agnostic memory analysis. Digital Investigation, S48\u2013S56 (2010)","key":"23_CR3","DOI":"10.1016\/j.diin.2010.05.007"},{"doi-asserted-by":"crossref","unstructured":"Hejazi, S.M., Talhi, C., Debbabi, M.: Extraction of forensically sensitive information from windows physical memory. Computer Security Laboratory, Concordia Institute for Information Systems Engineering, Concordia University, Montreal, Quebec, Canada (2009)","key":"23_CR4","DOI":"10.1016\/j.diin.2009.06.003"},{"unstructured":"Matthieu, S.: Exploiting Windows Hibernation. Den Haag, NL, Europol High Tech Crime Expert Meeting (2008)","key":"23_CR5"},{"unstructured":"CyberCheck 4.0, \n                    \n                      http:\/\/www.cyberforensics.in\/Products\/Cybercheck.aspx","key":"23_CR6"},{"unstructured":"EnCase Forensic, \n                    \n                      http:\/\/www.guidancesoftware.com","key":"23_CR7"},{"unstructured":"Walters, A.: FATKit: detecting malicious library injection and upping the \u201danti\u201d, Technical report. 4TFResearch Laboratories (July 2006)","key":"23_CR8"},{"doi-asserted-by":"crossref","unstructured":"Carvey, H.: Windows Forensic Analysis Toolkit (2012)","key":"23_CR9","DOI":"10.1016\/B978-1-59749-727-5.00005-2"},{"unstructured":"Shuhui, Z., Lianhai, W., Ruichao, Z., Qiuxiang, G.: Exploratory Study on Memory Analysis of Windows 7 Operating System. In: 3rd International Conference on Advanced Computer Theory and Engineering, ICACTE (2010)","key":"23_CR10"},{"unstructured":"Butler, J., Undercoffer, J.L., Pinkston, J.: Hidden Processes: The Implication for Intrusion Detection. In: IEEE Workshop on Information Assurance, NY (2003)","key":"23_CR11"},{"unstructured":"IDA, \n                    \n                      http:\/\/www.hex-rays.com\/products\/ida\/index.shtml","key":"23_CR12"},{"unstructured":"OllyDbg, \n                    \n                      http:\/\/www.ollydbg.de\/","key":"23_CR13"},{"unstructured":"Hibernation File Format, \n                    \n                      http:\/\/web17.webbpro.de\/downloads\/Hibernation%20File%20Attack\/Hibernation%20File%20Format.pdf","key":"23_CR14"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34135-9_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T22:32:19Z","timestamp":1558391539000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34135-9_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341342","9783642341359"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34135-9_23","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}