{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:12:05Z","timestamp":1725808325005},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319125671"},{"type":"electronic","value":"9783319125688"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44952-3_16","type":"book-chapter","created":{"date-parts":[[2014,10,9]],"date-time":"2014-10-09T12:38:21Z","timestamp":1412858301000},"page":"237-251","source":"Crossref","is-referenced-by-count":3,"title":["Smartphones as Distributed Witnesses for Digital Forensics"],"prefix":"10.1007","author":[{"given":"Heloise","family":"Pieterse","sequence":"first","affiliation":[]},{"given":"Martin","family":"Olivier","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"AccessData, Mobile Phone Examiner Plus (MPE+), Lindon, Utah (\n                    \n                      www.accessdata.com\/products\/digital-forensics\/mobile-phone-examiner\n                    \n                    \n                  )."},{"key":"16_CR2","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/11790754_9","volume-title":"Proceedings of the Third International Conference on Detection of Intrusions and Malware and Vulnerability Assessment","author":"A. Arnes","year":"2006","unstructured":"A. Arnes, P. Haas, G. Vigna and R. Kemmerer, Digital forensic reconstruction and the virtual security testbed ViSe, Proceedings of the Third International Conference on Detection of Intrusions and Malware and Vulnerability Assessment, pp. 144\u2013163, 2006."},{"key":"16_CR3","volume-title":"The Forensic Implications of SQLite\u2019s Write Ahead Log","author":"A. Caithness","year":"2012","unstructured":"A. Caithness, The Forensic Implications of SQLite\u2019s Write Ahead Log, CCL Group, Stratford-upon-Avon, United Kingdom (\n                    \n                      www.cclgroupltd.com\/the-forensic-implications-of-sqlites-write-ahead-log\n                    \n                    \n                  ), 2012."},{"key":"16_CR4","volume-title":"Digital Evidence and Computer Crime","author":"E. Casey","year":"2011","unstructured":"E. Casey, Digital Evidence and Computer Crime, Elsevier, Waltham, Massachusetts, 2011."},{"key":"16_CR5","volume-title":"Digital Forensic Evidence Examination","author":"F. Cohen","year":"2009","unstructured":"F. Cohen, Digital Forensic Evidence Examination, Fred Cohen & Associates, Livermore, California, 2009."},{"issue":"3","key":"16_CR6","doi-asserted-by":"publisher","first-page":"15","DOI":"10.4018\/jdcf.2010070102","volume":"2","author":"K. Curran","year":"2010","unstructured":"K. Curran, A. Robinson, S. Peacocke and S. Cassidy, Mobile phone forensic analysis, International Journal of Digital Crime and Forensics, vol. 2(3), pp. 15\u201327, 2010.","journal-title":"International Journal of Digital Crime and Forensics"},{"volume-title":"Management of Heterogeneous and Autonomous Database Systems","year":"1999","key":"16_CR7","unstructured":"A. Elmagarmid, M. Rusinkiewicz and A. Sheth (Eds.), Management of Heterogeneous and Autonomous Database Systems, Morgan Kaufmann Publishers, San Francisco, California, 1999."},{"key":"16_CR8","volume-title":"Data Integration","author":"M. Eltabakh","year":"2012","unstructured":"M. Eltabakh, Data Integration, CS561-Spring 2012, Department of Computer Science, Worcester Polytechnic Institute, Worcester, Massachusetts (\n                    \n                      http:\/\/web.cs.wpi.edu\/~cs561\/s12\/Lectures\/IntegrationOLAP\/DataIntegration.pdf\n                    \n                    \n                  ), 2012."},{"key":"16_CR9","unstructured":"Forensic Science Central, Crime Scene and Accident Scene Reconstruction (\n                    \n                      www.forensicsciencecentral.co.uk\/reconstruction.shtml\n                    \n                    \n                  ), 2005."},{"key":"16_CR10","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/IDEAS.2003.1214906","volume-title":"Proceedings of the Seventh International Database Engineering and Applications Symposium","author":"A. Gal","year":"2003","unstructured":"A. Gal, A. Trombetta, A. Anaby-Tavor and D. Montesi, A model for schema integration in heterogeneous databases, Proceedings of the Seventh International Database Engineering and Applications Symposium, pp. 2-11, 2003."},{"key":"16_CR11","unstructured":"P. Gladyshev, Formalizing Event Reconstruction in Digital Investigations, Ph.D. Dissertation, Department of Computer Science, University College Dublin, Dublin, Ireland, 2004."},{"issue":"2","key":"16_CR12","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.diin.2004.03.001","volume":"1","author":"P. Gladyshev","year":"2004","unstructured":"P. Gladyshev and A. Patel, Finite state machine approach to digital event reconstruction, Digital Investigation, vol. 1(2), pp. 130\u2013149, 2004.","journal-title":"Digital Investigation"},{"key":"16_CR13","volume-title":"Structured Query Language","author":"H. Halvorsen","year":"2012","unstructured":"H. Halvorsen, Structured Query Language, Department of Electrical Engineering, Information Technology and Cybernetics, Telemark University College, Porsgrunn, Norway (\n                    \n                      http:\/\/home.hit.no\/~hansha\/documents\/database\/documents\/Structured%20Query%20Language.pdf\n                    \n                    \n                  , 2012"},{"issue":"6","key":"16_CR14","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1007\/s00779-011-0428-7","volume":"16","author":"S. Jeon","year":"2012","unstructured":"S. Jeon, J. Bang, K. Byun and S. Lee, A recovery method of deleted record for SQLite database, Personal and Ubiquitous Computing, vol. 16(6), pp. 707\u2013715, 2012.","journal-title":"Personal and Ubiquitous Computing"},{"key":"16_CR15","unstructured":"MD\u2019s Technical Sharing, Raw access to SMS\/MMS database on Android phones (\n                    \n                      http:\/\/minhdanh2002.blogspot.com\/2012\/02\/raw-access-to-sms-database-on-android.html\n                    \n                    \n                  ), February 14, 2012."},{"key":"16_CR16","volume-title":"Crime Analysis Charting: An Introduction to Visual Investigative Analysis","author":"J. Morris","year":"1982","unstructured":"J. Morris, Crime Analysis Charting: An Introduction to Visual Investigative Analysis, Palmer Enterprises, Loomis, California, 1982."},{"key":"16_CR17","unstructured":"Oxygen Forensics, Oxygen Forensic Suite, Alexandria, Virginia (\n                    \n                      www.oxygen-forensic.com\/en\n                    \n                    \n                  )."},{"key":"16_CR18","volume-title":"Principles of Distributed Database Systems","author":"M. Ozsu","year":"2011","unstructured":"M. Ozsu and P. Valduriez, Principles of Distributed Database Systems, Springer, New York, 2011."},{"issue":"5","key":"16_CR19","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1145\/276404.276408","volume":"41","author":"C. Parent","year":"1998","unstructured":"C. Parent and S. Spaccapietra, Issues and approaches of database integration, Communications of the ACM, vol. 41(5), pp. 166\u2013178, 1998.","journal-title":"Communications of the ACM"},{"key":"16_CR20","unstructured":"P. Patodi, Database Recovery Mechanism for Android Devices, Ph.D. Dissertation, Department of Computer Science and Engineering, Indian Institute of Technology Bombay, Bombay, India, 2012."},{"issue":"8","key":"16_CR21","first-page":"3460","volume":"4","author":"M. Prasad","year":"2013","unstructured":"M. Prasad and Y. Satish, Reconstruction of events in digital forensics, International Journal of Engineering Trends and Technology, vol. 4(8), pp. 3460\u20133467, 2013.","journal-title":"International Journal of Engineering Trends and Technology"},{"issue":"12","key":"16_CR22","first-page":"21","volume":"24","author":"B. Schneier","year":"1999","unstructured":"B. Schneier, Attack trees, Dr. Dobb\u2019s Journal of Software Tools, vol. 24(12), pp. 21\u201329, 1999.","journal-title":"Dr. Dobb\u2019s Journal of Software Tools"},{"key":"16_CR23","unstructured":"SQLite, About SQLite, Charlotte, North Carolina (\n                    \n                      www.sqlite.org\/about.html\n                    \n                    \n                  )."},{"key":"16_CR24","unstructured":"SQLite, The SQLite Database File Format, Charlotte, North Carolina (\n                    \n                      www.sqlite.org\/fileformat.html\n                    \n                    \n                  )."},{"key":"16_CR25","unstructured":"SQLite, Write-Ahead Logging, Charlotte, North Carolina (\n                    \n                      www.sqlite.org\/wal.html\n                    \n                    \n                  ), 2013."},{"key":"16_CR26","unstructured":"P. Stephenson, Modeling of post-incident root cause analysis, International Journal of Digital Evidence, vol. 2(2), 2003."},{"key":"16_CR27","unstructured":"The iPhone Wiki, Messages (\n                    \n                      http:\/\/theiphonewiki.com\/wiki\/Messages\n                    \n                    \n                  ), August 16, 2013."},{"key":"16_CR28","unstructured":"viaForensics, viaExtract, Oak Park, Illinois (\n                    \n                      http:\/\/viaforensics.com\n                    \n                    \n                  )."}],"container-title":["Lecture Notes in Computer Science","Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44952-3_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T22:57:12Z","timestamp":1558997832000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-44952-3_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319125671","9783319125688"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44952-3_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}