{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:39:05Z","timestamp":1742985545938,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":5,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811076046"},{"type":"electronic","value":"9789811076053"}],"license":[{"start":{"date-parts":[[2017,12,20]],"date-time":"2017-12-20T00:00:00Z","timestamp":1513728000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-10-7605-3_73","type":"book-chapter","created":{"date-parts":[[2017,12,19]],"date-time":"2017-12-19T06:22:45Z","timestamp":1513664565000},"page":"446-451","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["System Information Comparison and Analysis Technology for Cyber Attacks"],"prefix":"10.1007","author":[{"given":"Hyeonsu","family":"Youn","sequence":"first","affiliation":[]},{"given":"Duhoe","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Yong-Hyun","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Dongkyoo","family":"Shin","sequence":"additional","affiliation":[]},{"given":"Dongil","family":"Shin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,20]]},"reference":[{"key":"73_CR1","unstructured":"Kim, K.W., Hong, D.W.: High-speed digital forensic technology. J. Korea Inst. Inf. Secur. Cryptology 19(5) (2009)"},{"key":"73_CR2","unstructured":"Han, J.S., Lee, S.J.: The windows physical memory dump explorer for live forensic. J. Korea Inst. Inf. Secur. Cryptology 21(2) (2011)"},{"issue":"1","key":"73_CR3","first-page":"75","volume":"26","author":"SG Kim","year":"2008","unstructured":"Kim, S.G., Kim, S.G., Choi, J.H.: Prospective cyber-warfare and its preparations. Commun. Korean Inst. Inf. Sci. Eng. 26(1), 75\u201386 (2008)","journal-title":"Commun. Korean Inst. Inf. Sci. Eng."},{"key":"73_CR4","doi-asserted-by":"crossref","unstructured":"Brezinski, D., Killalea, T.: Guidelines for evidence collection and archiving. No. RFC 3227 (2002)","DOI":"10.17487\/rfc3227"},{"issue":"12","key":"73_CR5","first-page":"21","volume":"24","author":"B Schneier","year":"1999","unstructured":"Schneier, B.: Attack trees. Dr. Dobb\u2019s\u00a0J. 24(12), 21\u201329 (1999)","journal-title":"Dr. Dobb\u2019s\u00a0J."}],"container-title":["Lecture Notes in Electrical Engineering","Advances in Computer Science and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-7605-3_73","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T03:16:51Z","timestamp":1570504611000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-7605-3_73"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,20]]},"ISBN":["9789811076046","9789811076053"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-7605-3_73","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2017,12,20]]}}}