{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T04:11:16Z","timestamp":1745467876644,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":40,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662436158"},{"type":"electronic","value":"9783662436165"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43616-5_8","type":"book-chapter","created":{"date-parts":[[2014,6,26]],"date-time":"2014-06-26T08:04:57Z","timestamp":1403769897000},"page":"203-223","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cybercrime Investigation Challenges: Middle East and North Africa"],"prefix":"10.1007","author":[{"given":"Mohamed","family":"Sarrab","sequence":"first","affiliation":[]},{"given":"Nasser","family":"Alalwan","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Alzahrani","sequence":"additional","affiliation":[]},{"given":"Mahdi","family":"Kordestani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,6,27]]},"reference":[{"key":"8_CR1","unstructured":"Loucif, K.: Africa, A New Safe Harbor for Cybercriminals? Trend Micro Incorporated (2013)"},{"key":"8_CR2","unstructured":"Wolf, P.: The South African Cyber Threat Barometer, A strategic public-private partnership (PPP) initiative to combat cybercrime in SA (2013)"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Alalwan, N. Alzahrani, A. and Sarrab, M.: Cybercrime investigation challenges For gulf cooperation council governments: a survey. In: Proceedings of the Eighth International Conference on Forensic Computer Science\u2014Icofcs, Brasilia, Brazil, pp. 33\u201336 (2013)","DOI":"10.5769\/C2013005"},{"key":"8_CR4","unstructured":"Timothy, E.: The field guide for investigating computer crime, part eight: information discovery. Symantec (2001)"},{"key":"8_CR5","unstructured":"Bahar, A.: Computer crime investigation. MSc Thesis, De Montfort University, Leicester, UK (2010)"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Richter, J., Kuntze, N., Rudolph, C.: Securing digital evidence. In: Fifth International Workshop on Systematic Approaches to Digital Forensic Engineering (2010)","DOI":"10.1109\/SADFE.2010.31"},{"key":"8_CR7","volume-title":"Computer Crime: A Crime fighters Handbook","author":"I David","year":"1995","unstructured":"David, I., Karl, S.: Computer Crime: A Crime fighters Handbook. OReilly Associates Inc, Sebastopol (1995)"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Loia, V., Mattiucci, M., Senatore, S., Veniero, M.: Computer crime investigation by means of fuzzy semantic maps. In: IEEE\/WIC\/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technologies (2009)","DOI":"10.1109\/WI-IAT.2009.258"},{"key":"8_CR9","unstructured":"Simundic, S., Franjic, S., Susic, T.: Databases and computer crime. In: 52nd International Symposium ELMAR, pp. 195\u2013201 (2010)"},{"key":"8_CR10","unstructured":"Yousef, H., Iqbal, A.: Digital forensics education in UAE. In: 6th International Conference on Internet Technology and Secured Transactions, Abu Dhabi, UAE (2011)"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Sammes, A., Jenkinson, B.: Forensic Computing a Practitioners Guide. Springer, New York (2000)","DOI":"10.1007\/978-1-4471-3661-3"},{"key":"8_CR12","unstructured":"Casey, E.: Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet, 1st edn. Academic Press, London (2000)"},{"key":"8_CR13","first-page":"2","volume":"1","author":"E Casey","year":"2002","unstructured":"Casey, E.: Error, uncertainty, and loss in digital evidence. Int. J. Digital Evid. 1, 2 (2002)","journal-title":"Int. J. Digital Evid."},{"key":"8_CR14","unstructured":"McLean, S.: Basic considerations in investigating computer crime, executing computer search warrants and seizing high technology equipment. In: 14th BILETA Conference: CYBERSPACE. Crime, Criminal Justice and the Internet (1999)"},{"key":"8_CR15","unstructured":"Prosise, C., Mandia, K.: Incident Response: Investigating Computer Crime. Mcgraw-Hill Osborne Media, San Francisco (2001)"},{"key":"8_CR16","doi-asserted-by":"publisher","DOI":"10.1201\/9781420048872","volume-title":"Investigating Computer Related Crime","author":"P Stephenson","year":"1999","unstructured":"Stephenson, P.: Investigating Computer Related Crime. CRC Press, Boca Raton (1999)"},{"key":"8_CR17","unstructured":"Warren B.: Challenges to criminal law making in the new global information society: a critical comparative study of the adequacies of computer-related criminal legislation in the United States, the United Kingdom and Singapore. www.law.ed.ac.uk\/ahrc\/complaw\/docs\/chik.doc visited 28 October (2011)"},{"key":"8_CR18","unstructured":"International Telecommunication Union, ICTs in Africa: Digital Divide to Digital Opportunity (2008)"},{"key":"8_CR19","unstructured":"Digital divide, Internet in Africa, wikipedia (2013)"},{"key":"8_CR20","unstructured":"United Nations, The Millennium Development Goals Report, We Can end poverty 2015 Millennium Development Goals New York (2013)"},{"key":"8_CR21","unstructured":"The Emerging Africa Infrastructure Fund: Sub-Saharan Africa (Multiple Countries), Telecoms, Seacom Undersea Cable (2007)"},{"key":"8_CR22","unstructured":"Fiber Optic Link Around the Globe, wikipedia (2013)"},{"key":"8_CR23","unstructured":"Internet World Stats, Usage and Population Statstics. http:\/\/www.internetworldstats.com\/list2.htm (2013)"},{"key":"8_CR24","unstructured":"Kingsley, K.: AfricaNews reporter in Abidjan, Ivory Coast, Africa\u2019s population now 1 billion. africanews.com (2009)"},{"key":"8_CR25","unstructured":"El-Guindy M.: Saudi Aramco cyber-attack, are we ready Net Safe, Middle East. http:\/\/netsafe.me2012-08-27saudi-aramco-cyber-attack-are-we-ready\/more-535 (2012)"},{"key":"8_CR26","unstructured":"Kim Z.: Legal experts: stuxnet attack on Iran was illegal act of force. http:\/\/www.wired.com (2013)"},{"key":"8_CR27","unstructured":"Symantec Employee, Stuxnet 0.5: The Missing Link, Symantec security response. http:\/\/www.symantec.com (2013)"},{"key":"8_CR28","unstructured":"Nicolas, F., Liam, M., Eric, C.: W32.Stuxnet Dossier, Symantec security response (2011)"},{"key":"8_CR29","unstructured":"David, K.: The Real Story of Stuxnet, How Kaspersky Lab tracked down the malware that stymied Irans nuclear-fuel enrichment program. http:\/\/spectrum.ieee.org\/telecom\/security\/the-real-story-of-stuxnet (2013)"},{"key":"8_CR30","unstructured":"Jarrad, S.: W32.Stuxnet, Symantec. http:\/\/www.symantec.com (2010)"},{"key":"8_CR31","unstructured":"Thomson, I.: The Register, Snowden: US and Israel did create Stuxnet attack code, UK is \u2018radioactive\u2019 and \u2018Queen\u2019s selfies to the pool boy\u2019 slurped. http:\/\/www.theregister.co.uk\/ (2013)"},{"key":"8_CR32","unstructured":"Waterman, S.: The Washington Times, U.S.-Israeli cyberattack on Iran was act of force, NATO study found, Strike devastated nuclear program. http:\/\/www.washingtontimes.com\/news\/2013\/mar\/24\/ (2013)"},{"key":"8_CR33","unstructured":"Alexander, G.: Securelist, The Duqu Saga Continues: Enter Mr. B. Jason and TVs Dexter (2011)"},{"key":"8_CR34","unstructured":"Boldizsar, B., Gabor, P., Levente, B., Mark, F.: Duqu: A Stuxnet-like malware found in the wild, Laboratory of Cryptography and System Security. CrySyS), Budapest University of Technology and Economics, Department of Telecommunications (2011)"},{"key":"8_CR35","unstructured":"Kaspersky.: Duqu: Steal Everything, Kaspersky Labs investigation. http:\/\/www.kaspersky.com (2012)"},{"key":"8_CR36","unstructured":"Symantec.: W32.Duqu, The precursor to the next Stuxnet, The Laboratory of cryptography and system security (CrySyS) (2011)"},{"key":"8_CR37","unstructured":"MAHER.: Identification of a New Targeted Cyber-Attack, MAHER, Copmuter Emergency Response Team Coordination Center, Information Technology Organization of Iran, Ministry of Information and Communication Technology (ICT) (2012)"},{"key":"8_CR38","unstructured":"sKyWIper Analysis Team, sKyWIper (a.k.a. Flame a.k.a. Flamer): A complex malware for targeted attacks, Laboratory of Cryptography and System Security (CrySyS), Budapest University of Technology and Economics, Department of Telecommunications (2012)"},{"key":"8_CR39","unstructured":"Alexander, G.: Securelist, The flame: questions and answers. https:\/\/www.securelist.com (2012)"},{"key":"8_CR40","unstructured":"Kabay, S.: Computer Security Handbook, Wiley, Hoboken (2002)"}],"container-title":["Intelligent Systems Reference Library","Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43616-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T08:47:30Z","timestamp":1674550050000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-43616-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662436158","9783662436165"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43616-5_8","relation":{},"ISSN":["1868-4394","1868-4408"],"issn-type":[{"type":"print","value":"1868-4394"},{"type":"electronic","value":"1868-4408"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"27 June 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}