{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:12:12Z","timestamp":1725808332811},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319125671"},{"type":"electronic","value":"9783319125688"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44952-3_15","type":"book-chapter","created":{"date-parts":[[2014,10,9]],"date-time":"2014-10-09T16:38:21Z","timestamp":1412872701000},"page":"227-235","source":"Crossref","is-referenced-by-count":1,"title":["An Open Source Toolkit for iOS Filesystem Forensics"],"prefix":"10.1007","author":[{"given":"Ahmad Raza","family":"Cheema","sequence":"first","affiliation":[]},{"given":"Mian Muhammad Waseem","family":"Iqbal","sequence":"additional","affiliation":[]},{"given":"Waqas","family":"Ali","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"comex, JailbreakMe (\n                    \n                      www.jailbreakme.com\n                    \n                    \n                  ), 2011."},{"key":"15_CR2","unstructured":"D. Compton, Own with an iPhone (\n                    \n                      www.youtube.com\/watch?v=zBm1UXmgz1k\n                    \n                    \n                  ), 2010."},{"key":"15_CR3","unstructured":"ElcomSoft, ElcomSoft Phone Password Breaker, Moscow, Russia (\n                    \n                      www.elcomsoft.com\/eppb.html\n                    \n                    \n                  ), 2014."},{"key":"15_CR4","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-3-642-24212-0_20","volume-title":"Advances in Digital Forensics VII","author":"A. Hay","year":"2011","unstructured":"A. Hay, D. Krill, B. Kuhar and G. Peterson, Evaluating digital forensic options for the Apple iPad, in Advances in Digital Forensics VII, G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 257\u2013274, 2011."},{"key":"15_CR5","volume-title":"Open source toolkit for iPhone filesystems file analysis","author":"W. Iqbal","year":"2013","unstructured":"W. Iqbal, Open source toolkit for iPhone filesystems file analysis (\n                    \n                      http:\/\/sites.google.com\/a\/mcs.edu.pk\/open-source-toolkit-for-iphone-file-system-files-analysis\/open-source-toolkit-for-iphone-file-systems-file-analysis\n                    \n                    \n                  ), 2013."},{"key":"15_CR6","volume-title":"Mac OS X, iPod and iPhone Forensic Analysis","author":"R. Kubasiak","year":"2009","unstructured":"R. Kubasiak, S. Morrissey, W. Barr, J. Brown, M. Caceres, M. Chasman and J. Cornell, Mac OS X, iPod and iPhone Forensic Analysis, Syngress Publishing, Burlington, Massachusetts, 2009."},{"key":"15_CR7","unstructured":"R. Mallepally, Implementation of Applications to Improve iPhone Forensic Analysis and Integrity of Evidence, M.S. Thesis, Department of Computing Sciences, Texas A&M University \u2013 Corpus Christi, Corpus Christi, Texas, 2011."},{"key":"15_CR8","unstructured":"National Institute of Standards and Technology, Mobile Devices, Computer Forensics Tool Testing Program, Gaithersburg, Maryland (\n                    \n                      www.cftt.nist.gov\/mobile_devices.htm\n                    \n                    \n                  )."},{"key":"15_CR9","unstructured":"J. Schmidt, iOpener: How safe is your iPhone data? The H Security, Heise Media UK, London, United Kingdom (\n                    \n                      www.h-online.com\/security\/features\/iOpener-How-safe-is-your-iPhone-data-1266713.html\n                    \n                    \n                  ), July 4, 2011."},{"key":"15_CR10","volume-title":"Analysis of the jailbreakme v3 font exploit","author":"J. Sigwald","year":"2011","unstructured":"J. Sigwald, Analysis of the jailbreakme v3 font exploit, Sogeti ESEC Lab (\n                    \n                      http:\/\/esec-lab.sogeti.com\/post\/Analysis-of-the-jailbreakme-v3-font-exploit\n                    \n                    \n                  ), 2011."},{"key":"15_CR11","volume-title":"iPhone Forensics","author":"J. Zdziarski","year":"2008","unstructured":"J. Zdziarski, iPhone Forensics, O\u2019Reilly Media, Sebastopol, California, 2008."}],"container-title":["Lecture Notes in Computer Science","Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44952-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T03:05:55Z","timestamp":1559012755000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-44952-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319125671","9783319125688"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44952-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}