{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:12:08Z","timestamp":1725808328853},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319125671"},{"type":"electronic","value":"9783319125688"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44952-3_20","type":"book-chapter","created":{"date-parts":[[2014,10,9]],"date-time":"2014-10-09T16:38:21Z","timestamp":1412872701000},"page":"297-307","source":"Crossref","is-referenced-by-count":0,"title":["Towards Fully Automated Digital Alibis with Social Interaction"],"prefix":"10.1007","author":[{"given":"Stefanie","family":"Beyer","sequence":"first","affiliation":[]},{"given":"Martin","family":"Mulazzani","sequence":"additional","affiliation":[]},{"given":"Sebastian","family":"Schrittwieser","sequence":"additional","affiliation":[]},{"given":"Markus","family":"Huber","sequence":"additional","affiliation":[]},{"given":"Edgar","family":"Weippl","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","first-page":"685","volume-title":"Proceedings of the Third International Conference on Intelligent Networking and Collaborative Systems","author":"P. Albano","year":"2011","unstructured":"P. Albano, A. Castiglione, G. Cattaneo, G. De Maio and A. De Santis, On the construction of a false digital alibi on the Android OS, Proceedings of the Third International Conference on Intelligent Networking and Collaborative Systems, pp. 685\u2013690, 2011."},{"key":"20_CR2","unstructured":"D. Beltrami, I\u2019m innocent. Just check my status on Facebook, New York Times, November 11, 2009."},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"D. Brezinski and T. Killalea, Guidelines for Evidence Collection and Archiving, RFC 3227, 2002.","DOI":"10.17487\/rfc3227"},{"key":"20_CR4","volume-title":"Proceedings of the Fifth Digital Forensic Research Workshop","author":"F. Buchholz","year":"2005","unstructured":"F. Buchholz and C. Falk, Design and implementation of Zeitline: A forensic timeline editor Proceedings of the Fifth Digital Forensic Research Workshop, 2005."},{"key":"20_CR5","volume-title":"File System Forensic Analysis","author":"B. Carrier","year":"2005","unstructured":"B. Carrier, File System Forensic Analysis, Addison-Wesley, Upper Saddle River, New Jersey, 2005."},{"key":"20_CR6","first-page":"392","volume-title":"Proceedings of the International Conference on Broadband and Wireless Computing, Communication and Applications","author":"A. Castiglione","year":"2011","unstructured":"A. Castiglione, G. Cattaneo, G. De Maio and A. De Santis, Automatic, selective and secure deletion of digital evidence, Proceedings of the International Conference on Broadband and Wireless Computing, Communication and Applications, pp. 392\u2013398, 2011."},{"key":"20_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1007\/978-3-642-32498-7_32","volume-title":"Multidisciplinary Research and Practice for Informations Systems","author":"A. Castiglione","year":"2012","unstructured":"A. Castiglione, G. Cattaneo, G. De Maio, A. De Santis, G. Costabile and M. Epifani, How to forge a digital alibi on Mac OS X, Proceedings of the IFIP WG 8.4\/8.9 International Cross Domain Conference and Workshop on Availability, Reliability and Security, pp. 430\u2013444, 2012."},{"key":"20_CR8","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/IMIS.2012.127","volume-title":"Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","author":"A. Castiglione","year":"2012","unstructured":"A. Castiglione, G. Cattaneo, G. De Maio, A. De Santis, G. Costabile and M. Epifani, The forensic analysis of a false digital alibi, Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 114\u2013121, 2012."},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/978-3-642-23300-5_28","volume-title":"Availability, Reliability and Security for Business, Enterprise and Health Information Systems","author":"A. Santis De","year":"2011","unstructured":"A. De Santis, A. Castiglione, G. Cattaneo, G. De Maio and M. Ianulardo, Automated construction of a false digital alibi, Proceedings of the IFIP WG 8.4\/8.9 International Cross Domain Conference and Workshop on Availability, Reliability and Security, pp. 359\u2013373, 2011."},{"issue":"S","key":"20_CR10","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.diin.2010.05.009","volume":"7","author":"S. Garfinkel","year":"2010","unstructured":"S. Garfinkel, Digital forensics research: The next 10 years, Digital Investigation, vol. 7(S), pp. S64\u2013S73, 2010.","journal-title":"Digital Investigation"},{"key":"20_CR11","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.cose.2012.09.011","volume":"32","author":"S. Garfinkel","year":"2012","unstructured":"S. Garfinkel, Digital media triage with bulk data analysis and bulk_extractor, Computers and Security, vol. 32, pp. 56\u201372, 2012.","journal-title":"Computers and Security"},{"key":"20_CR12","volume-title":"Android Forensics: Investigation, Analysis and Mobile Security for Google Android","author":"A. Hoog","year":"2011","unstructured":"A. Hoog, Android Forensics: Investigation, Analysis and Mobile Security for Google Android, Syngress, Waltham, Massachusetts, 2011."},{"key":"20_CR13","volume-title":"iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices","author":"A. Hoog","year":"2011","unstructured":"A. Hoog and K. Strzempka, iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices, Syngress, Waltham, Massachusetts, 2011."},{"key":"20_CR14","first-page":"113","volume-title":"Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference","author":"M. Huber","year":"2011","unstructured":"M. Huber, M. Mulazzani, M. Leithner, S. Schrittwieser, G. Wondracek and E. Weippl, Social snapshots: Digital forensics for online social networks, Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, pp. 113\u2013122, 2011."},{"key":"20_CR15","unstructured":"V. Juarez, Facebook status update provides alibi, CNN, November 13, 2009."},{"issue":"S","key":"20_CR16","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.diin.2009.06.008","volume":"6","author":"J. Olsson","year":"2009","unstructured":"J. Olsson and M. Boldt, Computer forensic timeline visualization tool, Digital Investigation, vol. 6(S), pp. S78\u2013S87, 2009.","journal-title":"Digital Investigation"},{"key":"20_CR17","unstructured":"R. Seifer, Garlasco, Alberto Stasi acquitted, Xomba (\n                    \n                      http:\/\/richardseifer.xomba.com\/garlasco_alberto_stasi_acquitted\n                    \n                    \n                  ), December 13, 2004."},{"key":"20_CR18","unstructured":"R. Wallace, The Elements of AIML Style, A.L.I.C.E. AI Foundation, 2003."}],"container-title":["Lecture Notes in Computer Science","Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44952-3_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T03:07:31Z","timestamp":1559012851000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-44952-3_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319125671","9783319125688"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44952-3_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}