{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T20:03:32Z","timestamp":1725998612350},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811315947"},{"type":"electronic","value":"9789811315954"}],"license":[{"start":{"date-parts":[[2018,10,31]],"date-time":"2018-10-31T00:00:00Z","timestamp":1540944000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-1595-4_41","type":"book-chapter","created":{"date-parts":[[2018,10,30]],"date-time":"2018-10-30T21:39:11Z","timestamp":1540935551000},"page":"509-517","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An Analytical Comparative Approach of Cloud Forensic Tools During Cyber Attacks in Cloud"],"prefix":"10.1007","author":[{"given":"Shaik","family":"Khaja Mohiddin","sequence":"first","affiliation":[]},{"given":"Suresh Babu","family":"Yalavarthi","sequence":"additional","affiliation":[]},{"given":"Venkatesh","family":"Kondragunta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,31]]},"reference":[{"key":"41_CR1","unstructured":"Ting, Y.-H., et al.: Design and implementation of a cloud digital forensic laboratory. In: Symposium on Cryptography and Information Security (2013)"},{"key":"41_CR2","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.diin.2016.05.001","volume":"18","author":"V Roussev","year":"2016","unstructured":"Roussev, V., Ahmed, I., Barreto, A., McCulley, S., Shanmughan, V.: Cloud forensics\u2013tool development studies and future outlook. Digital Investig. 18, 79\u201395 (2016)","journal-title":"Digital Investig."},{"key":"41_CR3","unstructured":"Amazon Elastic Computing Cloud. aws.amazon.com\/ec2"},{"key":"41_CR4","unstructured":"Cloud Hosting: CLoud Computing and Hybrid Infrastructure from GoGrid. http:\/\/www.gogrid.com"},{"key":"41_CR5","unstructured":"Google App Engine. http:\/\/code.google.com\/appengine"},{"key":"41_CR6","unstructured":"Salesforce CRM. http:\/\/www.salesforce.com\/platform"},{"key":"41_CR7","unstructured":"Dedicated Server, Managed Hosting, Web Hosting by Rackspace Hosting. http:\/\/www.rackspace.com"},{"key":"41_CR8","doi-asserted-by":"crossref","unstructured":"Mishra, A.K., et al.: Cloud forensics: state-of-the-art and reasearch challenges. In: International Symposium on Cloud and Services Computing (2012)","DOI":"10.1109\/ISCOS.2012.32"},{"key":"41_CR9","first-page":"38","volume-title":"Advances in Intelligent Systems and Computing","author":"Shaik Khaja Mohiddin","year":"2017","unstructured":"Mohiddin, S.K., Yalavarthi, S.B., Sharmila, S.: A complete ontological survey of cloud forensic in the area of cloud computing. In: Deep, K., et al. (eds.) Proceedings of Sixth International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol. 547. Springer, Singapore (2017)"},{"key":"41_CR10","unstructured":"Microsoft: NW3C-Microsoft COFEE (2014). https:\/\/cofee.nw3c.org"},{"key":"41_CR11","doi-asserted-by":"publisher","unstructured":"Mitrokotsa, A., et al.: Intrusion detection in MANET using classification algorithms: the effects of cost and model selection. Ad Hoc Netw. 11(1), 226\u2013237 (2013). ISSN: 15708705. https:\/\/doi.org\/10.1013\/j.adhoc.2012.05.006","DOI":"10.1013\/j.adhoc.2012.05.006"},{"key":"41_CR12","unstructured":"Volatility: Volatility Introduction\u2014volatility\u2014Introduction to volatility\u2014An advanced memory forensics framework (2014)"},{"key":"41_CR13","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-642-04155-6_3","volume-title":"Advances in Digital Forensics V","author":"Jill Slay","year":"2009","unstructured":"Slay, J., et al.: Advances in Digital Forensics V, Volume 306 of IFIP Advances in Information and Communication Technology, pp. 37\u201347. Springer, Berlin, Heidelberg (2009)"},{"key":"41_CR14","doi-asserted-by":"crossref","unstructured":"Craiger, P., et al.: Advances in Digital Forensics IV, Volume 285 of IFIP the International Federation for Information Processia. Springer, US (2008)","DOI":"10.1007\/978-0-387-73742-3"},{"key":"41_CR15","doi-asserted-by":"crossref","unstructured":"Al Fahdi, M., et al.: Challenges of digital forensic\u2014a survey of researchers and practitioners attitudes and opinions. In: Information Security for South Africa, pp. 1\u20138. IEEE (Aug 2013)","DOI":"10.1109\/ISSA.2013.6641058"},{"key":"41_CR16","unstructured":"Henry, P., et al.: The SANS survey of digital forensics and incident response. Technical report, SANS (July 2013)"},{"key":"41_CR17","unstructured":"https:\/\/resources.infosecinstitute.com\/computer-forensics-tools"}],"container-title":["Advances in Intelligent Systems and Computing","Soft Computing for Problem Solving"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-1595-4_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,29]],"date-time":"2019-10-29T23:19:04Z","timestamp":1572391144000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-1595-4_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,31]]},"ISBN":["9789811315947","9789811315954"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-1595-4_41","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018,10,31]]}}}