{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:10:57Z","timestamp":1725459057195},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642354151"},{"type":"electronic","value":"9783642354168"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35416-8_14","type":"book-chapter","created":{"date-parts":[[2012,11,15]],"date-time":"2012-11-15T03:35:58Z","timestamp":1352950558000},"page":"192-207","source":"Crossref","is-referenced-by-count":3,"title":["A Study for Classification of Web Browser Log and Timeline Visualization"],"prefix":"10.1007","author":[{"given":"Junghoon","family":"Oh","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Namheun","family":"Son","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sangjin","family":"Lee","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kyungho","family":"Lee","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Jones, K.J.: Forensic Analysis of Internet Explorer Activity Files. Foundstone (2003), \n                    \n                      http:\/\/www.foundstone.com\/us\/pdf\/wp_index_dat.pdf"},{"key":"14_CR2","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.diin.2009.01.003","volume":"5","author":"M.T. Pereira","year":"2009","unstructured":"Pereira, M.T.: Forensic analysis of the Firefox3 Internet history and recovery of deleted SQLite records. Digital Investigation\u00a05, 93\u2013103 (2009)","journal-title":"Digital Investigation"},{"key":"14_CR3","unstructured":"Browser Forensics, Forensic Analysis of Microsoft Internet Explorer Disk Cache, \n                    \n                      http:\/\/www.browserforensics.com\/?p=32"},{"key":"14_CR4","unstructured":"Facebook Graph API, \n                    \n                      https:\/\/developers.facebook.com\/docs\/reference\/api\/"},{"key":"14_CR5","unstructured":"Berners-Lee, T., Masinter, L.: RFC 1738: Uniform Resource Locator, \n                    \n                      http:\/\/tools.ietf.org\/html\/rfc1738"},{"key":"14_CR6","unstructured":"Nelson, J.S.: Google Analytics Cookies and the Forensic Implications, \n                    \n                      http:\/\/www.dfinews.com\/article\/google-analytics-cookies-and-forensic-implications?page=0,6"},{"key":"14_CR7","unstructured":"Oh, J.: Advanced Evidence Collection and Analysis of Web Browser Activity. In: DFRWS (2011), \n                    \n                      http:\/\/www.dfrws.org\/2011\/proceedings\/12-344.pdf"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35416-8_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T13:15:12Z","timestamp":1620134112000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35416-8_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642354151","9783642354168"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35416-8_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}