{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T13:24:22Z","timestamp":1775309062870,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811315916","type":"print"},{"value":"9789811315923","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,12,14]],"date-time":"2018-12-14T00:00:00Z","timestamp":1544745600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-1592-3_38","type":"book-chapter","created":{"date-parts":[[2018,12,13]],"date-time":"2018-12-13T17:26:17Z","timestamp":1544721977000},"page":"483-493","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["VMSSS: A Proposed Model for Cloud Forensic in Cloud Computing Using VM Snapshot Server"],"prefix":"10.1007","author":[{"given":"Shaik","family":"Sharmila","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ch.","family":"Aparna","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,12,14]]},"reference":[{"key":"38_CR1","unstructured":"http:\/\/cloud.cioreview.com\/news\/cloud-market-to-reach-121-billion-by-2015-nid-866-cid-17.html"},{"key":"38_CR2","unstructured":"Dykstra, Sherman, A.T.: Acquiring forensic evidence from infrastructure-as-a-service cloud computing: exploring and evaluating tools"},{"key":"38_CR3","doi-asserted-by":"crossref","unstructured":"Ruan, K., Carthy, J.: Cloud computing reference architecture and its forensic implications: a preliminary analysis. In: Digital Forensics and Cyber Crime. Springer, pp. 1\u201321 (2013)","DOI":"10.1007\/978-3-642-39891-9_1"},{"issue":"2","key":"38_CR4","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.diin.2012.07.001","volume":"9","author":"B Martini","year":"2012","unstructured":"Martini, B., Choo, K.K.R.: An integrated conceptual digital forensic framework for cloud computing. Digital Invest. 9(2), 71\u201380 (2012)","journal-title":"Digital Invest."},{"key":"38_CR5","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-642-24212-0_3","volume-title":"Advances in Digital Forensics VII","author":"Keyun Ruan","year":"2011","unstructured":"Ruan, K., Carthy, J., Kechadi, T., Crosbie, M.: Cloud forensics. In: Advances in Digital Forensics VII, vol. 361, no. IFIP Advances in Information and Communication Technology pp. 35\u201346 (2011)"},{"key":"38_CR6","doi-asserted-by":"crossref","unstructured":"Harrison, K., Bordbar, B., Ali, S.T.T., Dalton, C.I., Norman, A.: A framework for detecting malware in cloud by identifying symptoms. In: Enterprise Distributed Object Computing Conference (EDOC), IEEE 16th International, pp. 164\u2013172 (2012)","DOI":"10.1109\/EDOC.2012.27"},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"Wu, Z., Gianvecchio, S., Xie, M., Wang, H.: Mimimorphism: a new approach to binary code obfuscation. In: Proceedings of the 17th ACM conference on Computer and communications security. ACM, pp. 536\u2013546 (2010)","DOI":"10.1145\/1866307.1866368"},{"key":"38_CR8","unstructured":"Baltazar, J., Costoya, J., Flores, R.: The real face of koobface: the largest web 2.0 botnet explained. In: Trend Micro Research, vol. 5, no. 9, p. 10 (2009)"},{"key":"38_CR9","unstructured":"Falliere, N., Chien, E.: Zeus: king of the bots. In: Symantec Security Response, Technical Report 2009, available at: www.symantec.com\/content\/en\/us\/enterprise\/media\/securityresponse\/whitepapers\/zeuskingofbots.pdf"},{"key":"38_CR10","unstructured":"Porras, P., Saidi, H., Yegneswaran, V.: Conficker c analysis. SRI International, Technical Report 2009, Accessed 13 Mar 2013"},{"key":"38_CR11","unstructured":"Citrix Systems, Xen Hypervisor, xen.org\/products\/xenhyp.html"},{"key":"38_CR12","unstructured":"Kaspersky: Gauss: abnormal distribution. Kaspersky Lab Global Research and Analysis Team, Technical Report, 2012, available at: www.securelist.com\/en\/downloads\/vlpdfs\/kaspersky-lab-gauss.pdf"},{"key":"38_CR13","unstructured":"Symantec,\u201cInfostealer.Banker.C,\u201d www.symantec.com\/securityresponse\/writeup.jsp?docid\u2009=\u20092010-020216-0135-99"},{"key":"38_CR14","first-page":"42","volume":"2010","author":"B Nelson","year":"2010","unstructured":"Nelson, B.: Guide to computer forensics and investigations, 4, illustrated 3ed. Cengage Learning 2010, 42\u201348 (2010)","journal-title":"Cengage Learning"},{"key":"38_CR15","unstructured":"Arbone, M. et al.: Research in attacks, intrusions, and defenses. Lecture Notes in Computer Science. Springer, Berlin Heidelberg, vol. 7462, pp. 22\u201341"},{"key":"38_CR16","unstructured":"Butt, S. et al., (2012) Proceedings of the ACM Conference on Computer and Communications Security. Raleigh, North Carolina. ACM, Raleigh, New York, NY, pp. 253\u2013264"},{"key":"38_CR17","doi-asserted-by":"crossref","unstructured":"Harrison, C. et al.: IEEE 11th International Conference on. IEEE, Liverpool, pp. 163\u2013169 (2012)","DOI":"10.1109\/TrustCom.2012.113"},{"key":"38_CR18","unstructured":"Microsoft: Microsoft hyper -v homepage. http:\/\/www.microsoft.com\/en-us\/server-cloud\/hyper-v-server\/default.aspx (2012)"},{"key":"38_CR19","unstructured":"Xen: Xen homepage. http:\/\/www.xen.org\/ . Accessed date 15 March 2013 (2012)"},{"key":"38_CR20","unstructured":"Qemu: Qemu homepage. http:\/\/wiki.qemu.org\/Main_Page (2012). Accessed date 15 Mar 2013"},{"key":"38_CR21","unstructured":"Ware, V.M.: Vmware workstation overview. http:\/\/www.vmware.com\/products\/workstation\/overview.html (2012). Accessed date 15 March 2013"},{"key":"38_CR22","unstructured":"VM: Linux kvm homepage. http:\/\/www.linux-kvm.org\/page\/Main_Page (2012). Accessed date 15 Mar 2013"},{"key":"38_CR23","doi-asserted-by":"crossref","unstructured":"Neugschwandtner, M., et al.: Detection of Intrusions and Malware, and Vulnerability Assessment, volume 6201 of Lecture Notes in Computer Science. Springer, Berlin Heidelberg pp. 41\u201360. ISBN 978-3-642-14214-7 (2010)","DOI":"10.1007\/978-3-642-14215-4_3"},{"key":"38_CR24","doi-asserted-by":"crossref","unstructured":"Jiang, X., et al.: Proceedings of the 14th ACM conference on Computer and communications security, CCS\u201907. ACM, New York, NY, USA. pp. 128\u2013138. ISBN 978-1-59593-703-2. http:\/\/doi.acm (2007)","DOI":"10.1145\/1315245.1315262"},{"key":"38_CR25","unstructured":"Mohiddin, S.K. et al.: Proceedings of 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), A practical approach to overcome glitches in achieving high performance computing"}],"container-title":["Advances in Intelligent Systems and Computing","Soft Computing for Problem Solving"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-1592-3_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T12:35:27Z","timestamp":1775306127000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-1592-3_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,14]]},"ISBN":["9789811315916","9789811315923"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-1592-3_38","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,14]]},"assertion":[{"value":"14 December 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}