{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:21:53Z","timestamp":1725888113841},"publisher-location":"Singapore","reference-count":10,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811050404"},{"type":"electronic","value":"9789811050411"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-5041-1_69","type":"book-chapter","created":{"date-parts":[[2017,5,13]],"date-time":"2017-05-13T03:14:39Z","timestamp":1494645279000},"page":"426-431","source":"Crossref","is-referenced-by-count":0,"title":["Design for Network File Forensics System Based on Approximate Matching"],"prefix":"10.1007","author":[{"given":"Aonan","family":"Zhai","sequence":"first","affiliation":[]},{"given":"Fei","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Haiqing","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Junzheng","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Xiong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,14]]},"reference":[{"key":"69_CR1","doi-asserted-by":"crossref","unstructured":"Roussev, V.: Data fingerprinting with similarity digests. In: IFIP International Conference on Digital Forensics. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-15506-2_15"},{"key":"69_CR2","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.diin.2006.06.015","volume":"3","author":"J Kornblum","year":"2006","unstructured":"Kornblum, J.: Identifying almost identical files using context triggered piecewise hashing. Digit. Invest. 3, 91\u201397 (2006)","journal-title":"Digit. Invest."},{"issue":"2","key":"69_CR3","first-page":"23","volume":"9","author":"F Breitinger","year":"2014","unstructured":"Breitinger, F., Ibrahim, B.: File detection on network traffic using approximate matching. J. Digit. Forensics Secur. Law JDFSL 9(2), 23 (2014)","journal-title":"J. Digit. Forensics Secur. Law JDFSL"},{"key":"69_CR4","doi-asserted-by":"crossref","unstructured":"Breitinger, F., Harald, B.: Properties of a similarity preserving hash function and their realization in sdhash. In: Information Security for South Africa (ISSA 2012). IEEE (2012)","DOI":"10.1109\/ISSA.2012.6320445"},{"key":"69_CR5","doi-asserted-by":"crossref","first-page":"S34","DOI":"10.1016\/j.diin.2011.05.005","volume":"8","author":"V Roussev","year":"2011","unstructured":"Roussev, V.: An evaluation of forensic similarity hashes. Digit. Invest. 8, S34\u2013S41 (2011)","journal-title":"Digit. Invest."},{"key":"69_CR6","unstructured":"Vallentin, M., Paxson, V., Sommer, R.: VAST: a unified platform for interactive network forensics. In: Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, pp. 345\u2013362 (2016)"},{"key":"69_CR7","doi-asserted-by":"crossref","unstructured":"Halboob, W., Mahmod, R., Abulaish, M., Abbas, H., Saleem, K.: Data warehousing based computer forensics investigation framework. In: 2015 12th International Conference on Information Technology - New Generations, pp. 163\u2013168 (2015)","DOI":"10.1109\/ITNG.2015.31"},{"issue":"3","key":"69_CR8","first-page":"5","volume":"1","author":"IY Song","year":"2006","unstructured":"Song, I.Y., Maguire, J.D., Lee, K.J., Choi, N., Hu, X.H., Chen, P.: Designing a data warehouse for cyber crimes. J. Digit. Forensics Secur. Law 1(3), 5\u201322 (2006)","journal-title":"J. Digit. Forensics Secur. Law"},{"key":"69_CR9","first-page":"14","volume":"7","author":"ES Pilli","year":"2010","unstructured":"Pilli, E.S., Joshi, R.C., Niyogi, R.: Network forensic frameworks: survey and research challenges. Int. J. Digit. Forensics Incident Response Arch. 7, 14\u201327 (2010)","journal-title":"Int. J. Digit. Forensics Incident Response Arch."},{"issue":"Suppl. 1","key":"69_CR10","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1016\/j.diin.2011.05.005","volume":"8","author":"V Roussev","year":"2011","unstructured":"Roussev, V.: An evaluation of forensic similarity hashes. Digit. Invest. 8(Suppl. 1), 34\u201341 (2011). The Proceedings of the Eleventh Annual DFRWS Conference","journal-title":"Digit. Invest."}],"container-title":["Lecture Notes in Electrical Engineering","Advanced Multimedia and Ubiquitous Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-5041-1_69","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,13]],"date-time":"2017-05-13T03:31:01Z","timestamp":1494646261000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-5041-1_69"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811050404","9789811050411"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-5041-1_69","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2017]]}}}