{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:29:00Z","timestamp":1766136540885},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319125671"},{"type":"electronic","value":"9783319125688"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44952-3_19","type":"book-chapter","created":{"date-parts":[[2014,10,9]],"date-time":"2014-10-09T12:38:21Z","timestamp":1412858301000},"page":"279-295","source":"Crossref","is-referenced-by-count":2,"title":["Performance of a Logical, Five- Phase, Multithreaded, Bootable Triage Tool"],"prefix":"10.1007","author":[{"given":"Ibrahim","family":"Baggili","sequence":"first","affiliation":[]},{"given":"Andrew","family":"Marrington","sequence":"additional","affiliation":[]},{"given":"Yasser","family":"Jafar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"F. Adelstein, MFP: The Mobile Forensics Platform, International Journal of Digital Evidence, vol. 2(1), 2003."},{"issue":"2","key":"19_CR2","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.diin.2005.04.002","volume":"2","author":"N. Beebe","year":"2005","unstructured":"N. Beebe and J. Clark, A hierarchical, objectives-based framework for the digital investigations process, Digital Investigation, vol. 2(2), pp. 147\u2013167, 2005.","journal-title":"Digital Investigation"},{"key":"19_CR3","unstructured":"B. Carrier and E. Spafford, Getting physical with the digital investigation process, International Journal of Digital Evidence, vol. 2(2), 2003."},{"issue":"6","key":"19_CR4","doi-asserted-by":"publisher","first-page":"1353","DOI":"10.1111\/j.1556-4029.2009.01150.x","volume":"54","author":"E. Casey","year":"2009","unstructured":"E. Casey, M. Ferraro and L. Nguyen, Investigation delayed is justice denied: Proposals for expediting forensic examinations of digital evidence, Journal of Forensic Sciences, vol. 54(6), pp. 1353\u20131364, 2009.","journal-title":"Journal of Forensic Sciences"},{"key":"19_CR5","volume-title":"Testing the forensic soundness of forensic examination environments on bootable media","author":"A. Fathy","year":"2014","unstructured":"A. Fathy, A. Marrington, F. Iqbal and I. Baggili, Testing the forensic soundness of forensic examination environments on bootable media, submitted for publication, 2014."},{"issue":"S","key":"19_CR6","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.diin.2012.05.003","volume":"9","author":"S. Garfinkel","year":"2012","unstructured":"S. Garfinkel, A. Nelson and J. Young, A general strategy for differential forensic analysis, Digital Investigation, vol. 9(S), pp. S50\u2013S59, 2012.","journal-title":"Digital Investigation"},{"issue":"3","key":"19_CR7","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/j.annemergmed.2006.05.019","volume":"49","author":"K. Iserson","year":"2007","unstructured":"K. Iserson and J. Moskop, Triage in medicine, Part I: Concept, history and types, Annals of Emergency Medicine, vol. 49(3), pp. 275\u2013281, 2007.","journal-title":"Annals of Emergency Medicine"},{"key":"19_CR8","volume-title":"Fifth International Conference on Digital Forensics and Cyber Crime","author":"J. James","year":"2013","unstructured":"J. James, A. Lopez-Fernandez and P. Gladyshev, Measuring accuracy of automated investigation tools and procedures in digital investigations, presented at the Fifth International Conference on Digital Forensics and Cyber Crime, 2013."},{"key":"19_CR9","unstructured":"D. Kennedy and D. Sun, How to triage computer evidence: Tackling Moore\u2019s law with less, Evidence Technology Magazine, vol. 8(2), 2010."},{"issue":"3-4","key":"19_CR10","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.diin.2010.03.001","volume":"3","author":"R. Mislan","year":"2010","unstructured":"R. Mislan, E. Casey and G. Kessler, The growing need for on-scene triage of mobile devices, Digital Investigation, vol. 3(3-4), pp. 112\u2013124, 2010.","journal-title":"Digital Investigation"},{"key":"19_CR11","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/SADFE.2007.3","volume-title":"Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering","author":"M. Pollitt","year":"2007","unstructured":"M. Pollitt, An ad hoc review of digital forensic models, Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 43\u201354, 2007."},{"key":"19_CR12","unstructured":"M. Reith, C. Carr and G. Gunsch, An examination of digital forensic models, International Journal of Digital Evidence, vol. 1(3), 2002"},{"key":"19_CR13","first-page":"76","volume-title":"Digital Crime and Forensic Science in Cyberspace","author":"G. Richard III","year":"2006","unstructured":"G. Richard III and V. Roussev, Digital forensics tools: The next generation, in Digital Crime and Forensic Science in Cyberspace, P. Kanellis, E. Kiountouzis, N. Kolokotronis and D. Martakos (Eds.), IGI Global, Hershey, Pennsylvania, pp. 76\u201391, 2006."},{"key":"19_CR14","first-page":"27","volume-title":"Proceedings of the Conference on Digital Forensics, Security and Law","author":"M. Rogers","year":"2006","unstructured":"M. Rogers, J. Goldman, R. Mislan, T. Wedge and S. Debrota, Computer Forensics Field Triage Process Model, Proceedings of the Conference on Digital Forensics, Security and Law, pp. 27\u201340, 2006."},{"key":"19_CR15","unstructured":"P. Stephenson, Modeling of post-incident root cause analysis, International Journal of Digital Evidence, vol. 2(2), 2003."},{"key":"19_CR16","volume-title":"Linux for Computer Investigators: Pitfalls of Mounting Filesystems","author":"M. Suhanov","year":"2009","unstructured":"M. Suhanov, Linux for Computer Investigators: Pitfalls of Mounting Filesystems (\n                    \n                      www.forensicfocus.com\/linux-forensics-pitfalls-of-mounting-file-systems\n                    \n                    \n                  ), 2009."},{"key":"19_CR17","volume-title":"SANS Digital Forensics and Incident Response","author":"C. Tilbury","year":"2011","unstructured":"C. Tilbury, NTFS $I30 index attributes: Evidence of deleted and overwritten files, SANS Digital Forensics and Incident Response (\n                    \n                      http:\/\/computer-forensics.sans.org\/blog\/2011\/09\/20\/ntfs-i30-index-attributes-evidence-of-deleted-and-overwritten-files\n                    \n                    \n                  ), September 20, 2011."}],"container-title":["Lecture Notes in Computer Science","Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44952-3_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T23:29:29Z","timestamp":1558999769000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-44952-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319125671","9783319125688"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44952-3_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}