{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T18:09:08Z","timestamp":1777486148336,"version":"3.51.4"},"publisher-location":"Singapore","reference-count":35,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811680588","type":"print"},{"value":"9789811680595","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-8059-5_16","type":"book-chapter","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:03:12Z","timestamp":1638450192000},"page":"277-287","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Analysis of File Carving Approaches: A Literature Review"],"prefix":"10.1007","author":[{"given":"Nor Ika Shahirah","family":"Ramli","sequence":"first","affiliation":[]},{"given":"Syifak Izhar","family":"Hisham","sequence":"additional","affiliation":[]},{"given":"Gran","family":"Badshah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,1]]},"reference":[{"key":"16_CR1","doi-asserted-by":"publisher","unstructured":"Afrizal, A., et al.: Analysis and implementation of signature based method and structure file based method for file carving. Indones. J. Comput. 6, 13\u201322 (2021). https:\/\/doi.org\/10.34818\/indojc.2021.6.1.457","DOI":"10.34818\/indojc.2021.6.1.457"},{"issue":"24","key":"16_CR2","first-page":"5137","volume":"15","author":"N Alherbawi","year":"2016","unstructured":"Alherbawi, N., et al.: A survey on data carving in digital forensic. Asian J. Inf. Technol. 15(24), 5137\u20135144 (2016)","journal-title":"Asian J. Inf. Technol."},{"key":"16_CR3","doi-asserted-by":"publisher","unstructured":"Ali, R.R., Mohamad, K.M.: RX_myKarve carving framework for reassembling complex fragmentations of JPEG images. J. King Saud Univ. Comput. Inf. Sci. 33(1), 21\u201332 (2021). https:\/\/doi.org\/10.1016\/j.jksuci.2018.12.007","DOI":"10.1016\/j.jksuci.2018.12.007"},{"key":"16_CR4","doi-asserted-by":"publisher","unstructured":"Alshammari, E., et al.: A new technique for file carving on hadoop ecosystem. In: Proceedings of 2017 International Conference on New Trends Computing Sciences, ICTCS 2017, January 2018, pp. 72\u201377 (2017). https:\/\/doi.org\/10.1109\/ICTCS.2017.16","DOI":"10.1109\/ICTCS.2017.16"},{"key":"16_CR5","unstructured":"Bayne, E.: Accelerating digital forensic searching through GPU parallel processing techniques. Abertay University (2017)"},{"key":"16_CR6","doi-asserted-by":"publisher","unstructured":"Bayne, E., et al.: OpenForensics: a digital forensics GPU pattern matching approach for the 21st century. In: DFRWS 2018 EU \u2013 Proceedings of 5th Annual DFRWS Europe, vol. 24, pp. S29\u2013S37 (2018). https:\/\/doi.org\/10.1016\/j.diin.2018.01.005","DOI":"10.1016\/j.diin.2018.01.005"},{"key":"16_CR7","doi-asserted-by":"publisher","unstructured":"Beverly, R., et al.: Forensic carving of network packets and associated data structures. Digit. Investig. 8(Suppl.), S78\u2013S89 (2011). https:\/\/doi.org\/10.1016\/j.diin.2011.05.010","DOI":"10.1016\/j.diin.2011.05.010"},{"key":"16_CR8","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.diin.2018.09.001","volume":"27","author":"WA Bhat","year":"2018","unstructured":"Bhat, W.A., Wani, M.A.: Forensic analysis of B-tree file system (Btrfs). Digit. Investig. 27, 57\u201370 (2018). https:\/\/doi.org\/10.1016\/j.diin.2018.09.001","journal-title":"Digit. Investig."},{"key":"16_CR9","doi-asserted-by":"publisher","unstructured":"Chen, Q., et al.: File fragment classification using grayscale image conversion and deep learning in digital forensics. In: Proceedings of 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018, pp. 140\u2013147 (2018). https:\/\/doi.org\/10.1109\/SPW.2018.00029","DOI":"10.1109\/SPW.2018.00029"},{"issue":"2","key":"16_CR10","first-page":"25","volume":"1","author":"F Darnowski","year":"2015","unstructured":"Darnowski, F., Chojnaki, A.: Selected methods of file carving and analysis of digital storage media in computer forensics. Teleinform. Rev. 1(2), 25\u201340 (2015)","journal-title":"Teleinform. Rev."},{"key":"16_CR11","doi-asserted-by":"publisher","unstructured":"Durmus, E., et al.: Image carving with missing headers and missing fragments. In: 2017 IEEE International Workshop on Information Forensics and Security, WIFS 2017, January 2018, pp. 1\u20136 (2017). https:\/\/doi.org\/10.1109\/WIFS.2017.8267665","DOI":"10.1109\/WIFS.2017.8267665"},{"key":"16_CR12","unstructured":"Ezequiel, R., Haro, J.: Forensic tool to study and carve virtual machine hard disk file (2019)"},{"key":"16_CR13","doi-asserted-by":"publisher","unstructured":"Garfinkel, S.L., McCarrin, M.: Hash-based carving: searching media for complete files and file fragments with sector hashing and hashdb. In: Proceedings of Digital Forensic Research Conference, DFRWS 2015, USA, vol. 14, pp. S95\u2013S105 (2015). https:\/\/doi.org\/10.1016\/j.diin.2015.05.001","DOI":"10.1016\/j.diin.2015.05.001"},{"key":"16_CR14","doi-asserted-by":"publisher","unstructured":"Hand, S., et al.: Bin-carver: automatic recovery of binary executable files. In: Proceedings of Digital Forensic Research Conference, DFRWS 2012, USA, pp. S108\u2013S117 (2012). https:\/\/doi.org\/10.1016\/j.diin.2012.05.014","DOI":"10.1016\/j.diin.2012.05.014"},{"key":"16_CR15","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.diin.2019.07.007","volume":"30","author":"HS Heo","year":"2019","unstructured":"Heo, H.S., et al.: Automated recovery of damaged audio files using deep neural networks. Digit. Investig. 30, 117\u2013126 (2019). https:\/\/doi.org\/10.1016\/j.diin.2019.07.007","journal-title":"Digit. Investig."},{"key":"16_CR16","unstructured":"Hiester, L.: File fragment classification using neural networks with lossless representations networks with lossless representations. Undergraduate Honors Theses, pp. 1\u201332 (2018)"},{"key":"16_CR17","unstructured":"Kadir, N.F.B.A.: Statistical byte frequency analysis for identifying JPEG. Universiti Teknologi Malaysia (2015)"},{"key":"16_CR18","doi-asserted-by":"publisher","unstructured":"Karresand, M., et al.: Creating a map of user data in NTFS to improve file carving. IFIP Adv. Inf. Commun. Technol. 569, 133\u2013158 (2019). https:\/\/doi.org\/10.1007\/978-3-030-28752-8_8","DOI":"10.1007\/978-3-030-28752-8_8"},{"key":"16_CR19","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/978-3-642-39218-4_31","volume-title":"Security and Privacy Protection in Information Processing Systems","author":"T Laurenson","year":"2013","unstructured":"Laurenson, T.: Performance analysis of file carving tools. In: Janczewski, L.J., Wolfe, H.B., Shenoi, S. (eds.) SEC 2013. IAICT, vol. 405, pp. 419\u2013433. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39218-4_31"},{"key":"16_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.01.020","author":"L Liebler","year":"2019","unstructured":"Liebler, L., et al.: On efficiency of artifact lookup strategies in digital forensics. Digit. Investig. (2019). https:\/\/doi.org\/10.1016\/j.diin.2019.01.020","journal-title":"Digit. Investig."},{"issue":"12","key":"16_CR21","doi-asserted-by":"publisher","first-page":"18859","DOI":"10.1007\/s11042-021-10681-x","volume":"80","author":"M Masoumi","year":"2021","unstructured":"Masoumi, M., Keshavarz, A., Fotohi, R.: File fragment recognition based on content and statistical features. Multimedia Tools Appl. 80(12), 18859\u201318874 (2021). https:\/\/doi.org\/10.1007\/s11042-021-10681-x","journal-title":"Multimedia Tools Appl."},{"key":"16_CR22","volume-title":"A Contemporary Investigation of NTFS File Fragmentation","author":"V van der Meer","year":"2021","unstructured":"van der Meer, V., et al.: A Contemporary Investigation of NTFS File Fragmentation. Radboud University, Nijmegen (2021)"},{"issue":"3","key":"16_CR23","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1016\/j.diin.2014.06.008","volume":"11","author":"W Minnaard","year":"2014","unstructured":"Minnaard, W.: The Linux FAT32 allocator and file creation order reconstruction. Digit. Investig. 11(3), 224\u2013233 (2014). https:\/\/doi.org\/10.1016\/j.diin.2014.06.008","journal-title":"Digit. Investig."},{"key":"16_CR24","doi-asserted-by":"crossref","unstructured":"Mittal, G., et al.: FiFTy: large-scale file fragment type identification using neural networks 16(Table I), 28\u201341 (2019). arXiv","DOI":"10.1109\/TIFS.2020.3004266"},{"key":"16_CR25","doi-asserted-by":"publisher","unstructured":"Prade, P., et al.: Forensic analysis of the resilient file system (ReFS) version 3.4. Forensic Sci. Int. Digit. Investig. 32, 300915 (2020). https:\/\/doi.org\/10.1016\/j.fsidi.2020.300915","DOI":"10.1016\/j.fsidi.2020.300915"},{"key":"16_CR26","doi-asserted-by":"publisher","unstructured":"Ravi, A., et al.: A method for carving fragmented document and image files. In: 2016 International Conference on Advances in Human Machine Interaction, HMI 2016, pp. 43\u201347 (2016). https:\/\/doi.org\/10.1109\/HMI.2016.7449170","DOI":"10.1109\/HMI.2016.7449170"},{"key":"16_CR27","unstructured":"Romano, L.M.P.C.: File carving in practice. Universidade do Minho (2015)"},{"key":"16_CR28","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1088\/1742-6596\/1529\/5\/052011","volume":"1529","author":"SA Sari","year":"2020","unstructured":"Sari, S.A., Mohamad, K.M.: A review of graph theoretic and weightage techniques in file carving. J. Phys. Conf. Ser. 1529, 5 (2020). https:\/\/doi.org\/10.1088\/1742-6596\/1529\/5\/052011","journal-title":"J. Phys. Conf. Ser."},{"key":"16_CR29","doi-asserted-by":"publisher","first-page":"301121","DOI":"10.1016\/j.fsidi.2021.301121","volume":"36","author":"J Sester","year":"2021","unstructured":"Sester, J., et al.: A comparative study of support vector machine and neural networks for file type identification using N-gram analysis. Forensic Sci. Int. Digit. Investig. 36, 301121 (2021). https:\/\/doi.org\/10.1016\/j.fsidi.2021.301121","journal-title":"Forensic Sci. Int. Digit. Investig."},{"key":"16_CR30","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.diin.2017.08.004","volume":"23","author":"K Shi","year":"2017","unstructured":"Shi, K., et al.: A novel file carving algorithm for National Marine Electronics Association (NMEA) logs in GPS forensics. Digit. Investig. 23, 11\u201321 (2017). https:\/\/doi.org\/10.1016\/j.diin.2017.08.004","journal-title":"Digit. Investig."},{"issue":"8","key":"16_CR31","doi-asserted-by":"publisher","first-page":"1549","DOI":"10.1109\/TIFS.2015.2416685","volume":"10","author":"E Uzun","year":"2015","unstructured":"Uzun, E., Sencar, H.T.: Carving orphaned JPEG file fragments. IEEE Trans. Inf. Forensics Secur. 10(8), 1549\u20131563 (2015). https:\/\/doi.org\/10.1109\/TIFS.2015.2416685","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"16_CR32","doi-asserted-by":"publisher","unstructured":"Vulinovic, K., et al.: Neural networks for file fragment classification. In: Proceedings of 2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics, MIPRO 2019, pp. 1194\u20131198 (2019). https:\/\/doi.org\/10.23919\/MIPRO.2019.8756878","DOI":"10.23919\/MIPRO.2019.8756878"},{"issue":"1","key":"16_CR33","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s11042-010-0704-y","volume":"61","author":"B Yoo","year":"2012","unstructured":"Yoo, B., et al.: A study on multimedia file carving method. Multimed. Tools Appl. 61(1), 243\u2013261 (2012). https:\/\/doi.org\/10.1007\/s11042-010-0704-y","journal-title":"Multimed. Tools Appl."},{"key":"16_CR34","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-642-23602-0_13","volume-title":"Forensics in Telecommunications, Information, and Multimedia","author":"X Zha","year":"2011","unstructured":"Zha, X., Sahni, S.: Fast in-place file carving for digital forensics. In: Lai, X., Gu, D., Jin, B., Wang, Y., Li, H. (eds.) e-Forensics 2010. LNICSSITE, vol. 56, pp. 141\u2013158. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23602-0_13"},{"issue":"3","key":"16_CR35","first-page":"93","volume":"2020","author":"H Lee","year":"2020","unstructured":"Lee, H., Lee, H.-W.: Block based smart carving system for forgery analysis and fragmented file identification. J. Internet Comput. Serv. 2020(3), 93\u2013102 (2020)","journal-title":"J. Internet Comput. Serv."}],"container-title":["Communications in Computer and Information Science","Advances in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-8059-5_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:15:14Z","timestamp":1638450914000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-8059-5_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811680588","9789811680595"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-8059-5_16","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACeS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Penang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aces2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.aces.usm.my\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"92","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}