{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T15:33:48Z","timestamp":1764603228593,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545672"},{"type":"electronic","value":"9783642545689"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54568-9_25","type":"book-chapter","created":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T14:31:35Z","timestamp":1395325895000},"page":"380-389","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["On the Privacy of Private Browsing \u2013 A Forensic Approach"],"prefix":"10.1007","author":[{"given":"Kiavash","family":"Satvat","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Matthew","family":"Forshaw","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Feng","family":"Hao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ehsan","family":"Toreini","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,3,21]]},"reference":[{"key":"25_CR1","unstructured":"Chrome Private Browsing Mode. https:\/\/support.google.com\/chrome\/bin\/answer.py?hl=en&answer=95464&p=cpn_incognito. Accessed April 2013"},{"key":"25_CR2","unstructured":"Mozilla Firefox Private Browsing Mode. http:\/\/support.mozilla.org\/en-US\/kb\/private-browsing-browse-web-without-saving-info. Accessed April 2013"},{"key":"25_CR3","unstructured":"Safari Private Browsing Mode. http:\/\/support.apple.com\/kb\/PH5000. Accessed April 2013"},{"key":"25_CR4","unstructured":"Internet Explorer Private Browsing Mode. http:\/\/windows.microsoft.com\/en-us\/windows-vista\/what-is-inprivate-browsing. Accessed April 2013"},{"key":"25_CR5","unstructured":"Aggarwal, G., Burzstein, E., Jackson, C., Boneh, D.: An analysis of private browsing modes in modern browsers. In: The 19th USENIX Symphosium on Security (2010)"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Said, H., Mutawa, A.H., Awadhi, A.I., Guimaraes, M.: Forensic analysis of private browsing artifacts. In: International Conference on Innovations in Information Technology (IIT) (2011)","DOI":"10.1109\/INNOVATIONS.2011.5893816"},{"issue":"5","key":"25_CR7","doi-asserted-by":"publisher","first-page":"1473","DOI":"10.1016\/j.jnca.2012.02.011","volume":"35","author":"A Ruiz-Mart\u00ednez","year":"2012","unstructured":"Ruiz-Mart\u00ednez, A.: A survey on solutions and main free tools for privacy enhancing Web communications. J. Netw. Comput. Appl. 35(5), 1473\u20131492 (2012)","journal-title":"J. Netw. Comput. Appl."},{"key":"25_CR8","unstructured":"Collin, J., Bortz, A., Boneh, D., Mitchell, C.J.: Protecting browser state from web privacy attacks. In: The 15th International Conference on World Wide Web (WWW) (2006)"},{"key":"25_CR9","unstructured":"Most Popular Web Browsers. http:\/\/www.w3schools.com\/browsers\/browsers_stats.asp. Accessed April 2013"},{"key":"25_CR10","unstructured":"VMware Player Version 4.0.0. http:\/\/www.vmware.com\/products\/player\/. Accessed April 2013"},{"key":"25_CR11","unstructured":"Click & Clean. https:\/\/chrome.google.com\/webstore\/detail\/ghgabhipcejejjmhhchfonmamedcbeod?utm_source=chrome-ntp-icon. Accessed April 2013"},{"key":"25_CR12","unstructured":"Clear DNS Cache. https:\/\/addons.mozilla.org\/en-us\/firefox\/addon\/clear-dns-cache\/. Accessed April 2013"},{"issue":"6","key":"25_CR13","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1007\/s00779-011-0428-7","volume":"16","author":"S Jeon","year":"2011","unstructured":"Jeon, S., Bang, J., Byun, K.: A recovery method of deleted record for SQLite database. Pers. Ubiquit. Comput. 16(6), 707\u2013715 (2011)","journal-title":"Pers. Ubiquit. Comput."},{"key":"25_CR14","unstructured":"Eckersley, P.: How unique is your web browser? https:\/\/panopticlick.eff.org\/browser-uniqueness.pdf. Accessed April 2013"},{"key":"25_CR15","unstructured":"The Official Website for the TOR Project. https:\/\/www.torproject.org\/. Accessed April 2013"},{"key":"25_CR16","volume-title":"Introductory Mathematical Statistics","author":"E Kreyszig","year":"1970","unstructured":"Kreyszig, E.: Introductory Mathematical Statistics. Wiley, New York (1970)"},{"key":"25_CR17","unstructured":"Selenium. http:\/\/seleniumhq.org\/. Accessed April 2013"},{"key":"25_CR18","unstructured":"Standard Chrome Extension API. http:\/\/developer.chrome.com\/extensions\/. Accessed April 2013"},{"key":"25_CR19","unstructured":"Experimental Chrome Extension API. http:\/\/developer.chrome.com\/extensions\/experimental.html. Accessed April 2013"},{"key":"25_CR20","unstructured":"Open-Source Software Tools Developed for the Research of Private Browsing. http:\/\/homepages.cs.ncl.ac.uk\/m.j.forshaw1\/privatebrowsing\/"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Autonomous Spontaneous Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54568-9_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T00:02:45Z","timestamp":1675987365000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-54568-9_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545672","9783642545689"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54568-9_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"21 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}