{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:40:15Z","timestamp":1743118815266,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":11,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811666230"},{"type":"electronic","value":"9789811666247"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-6624-7_2","type":"book-chapter","created":{"date-parts":[[2022,2,28]],"date-time":"2022-02-28T04:26:48Z","timestamp":1646022408000},"page":"11-18","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Information Retrieval for Cloud Forensics"],"prefix":"10.1007","author":[{"given":"Prasad","family":"Purnaye","sequence":"first","affiliation":[]},{"given":"Vrushali","family":"Kulkarni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,28]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","unstructured":"Zawoad, S., Hasan, R., Skjellum, A.: OCF: an open cloud forensics model for reliable digital forensics. In: 2015 IEEE 8th International Conference on Cloud Computing, pp. 437\u2013444. (2015). https:\/\/doi.org\/10.1109\/CLOUD.2015.65","DOI":"10.1109\/CLOUD.2015.65"},{"key":"2_CR2","doi-asserted-by":"publisher","first-page":"S87","DOI":"10.1016\/j.diin.2013.06.010","volume":"10","author":"J Dykstra","year":"2013","unstructured":"Dykstra, J., Sherman, A.T.: Design and implementation of FROST: digital forensic tools for the OpenStack cloud computing platform. Digit. Investig. 10, S87\u2013S95 (2013)","journal-title":"Digit. Investig."},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Raju, BKSP Kumar, Geethakumari, G.: SNAPS: towards building snapshot-based provenance system for virtual machines in the cloud environment. Comput. Secur. 86, 92\u2013111 (2019)","DOI":"10.1016\/j.cose.2019.05.020"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Aniello, C., et al.: A novel methodology to acquire live big data evidence from the cloud. IEEE Trans. Big Data 5.4, 425\u2013438 (2017)","DOI":"10.1109\/TBDATA.2017.2683521"},{"key":"2_CR5","doi-asserted-by":"publisher","first-page":"S104","DOI":"10.1016\/j.diin.2016.01.013","volume":"16","author":"V Roussev","year":"2016","unstructured":"Roussev, V., McCulley, S.: Forensic analysis of cloud-native artifacts. Digit. Investig. 16, S104\u2013S113 (2016)","journal-title":"Digit. Investig."},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Vassil, R., et al.: Cloud forensics\u2013tool development studies and future outlook. Digital Investigation 18, 79\u201395 (2016)","DOI":"10.1016\/j.diin.2016.05.001"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Zhengwei, Q. et al.: ForenVisor: a tool for acquiring and preserving reliable data in cloud live forensics. IEEE Trans. Cloud Comput. 5.3, 443\u2013456 (2016)","DOI":"10.1109\/TCC.2016.2535295"},{"key":"2_CR8","unstructured":"Shams, Z., Dutta, A.K., Hasan, R.: SecLaaS: secure logging-as-a-service for cloud forensics. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (2013)"},{"key":"2_CR9","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/j.procs.2013.06.023","volume":"19","author":"C Federici","year":"2013","unstructured":"Federici, C.: AlmaNebula: a computer forensics framework for the cloud. Proc. Comput. Sci. 19, 139\u2013146 (2013)","journal-title":"Proc. Comput. Sci."},{"key":"2_CR10","doi-asserted-by":"publisher","unstructured":"Purnaye, P., Kulkarni, V.: Memory dumps of virtual machines for cloud forensics. IEEE Dataport, December 15, (2020). https:\/\/doi.org\/10.21227\/ft6c-2915","DOI":"10.21227\/ft6c-2915"},{"key":"2_CR11","doi-asserted-by":"publisher","unstructured":"Purnaye, P., Kulkarni, V.: OpenNebula virtual machine profiling for intrusion detection system. IEEE Dataport (2020). https:\/\/doi.org\/10.21227\/24mb-vt61","DOI":"10.21227\/24mb-vt61"}],"container-title":["Smart Innovation, Systems and Technologies","Intelligent Data Engineering and Analytics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-6624-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T17:17:04Z","timestamp":1651771024000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-6624-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811666230","9789811666247"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-6624-7_2","relation":{},"ISSN":["2190-3018","2190-3026"],"issn-type":[{"type":"print","value":"2190-3018"},{"type":"electronic","value":"2190-3026"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"28 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}