{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,7]],"date-time":"2024-02-07T08:34:47Z","timestamp":1707294887566},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,9,3]],"date-time":"2021-09-03T00:00:00Z","timestamp":1630627200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,9,3]],"date-time":"2021-09-03T00:00:00Z","timestamp":1630627200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Polizeiakademie Niedersachsen"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Informatik Spektrum"],"published-print":{"date-parts":[[2021,10]]},"abstract":"<jats:title>Zusammenfassung<\/jats:title><jats:p>Die seit Jahrhunderten verwendeten Methoden in der Forensik basieren auf der Annahme eines Austausches von Materie und Mustern. Durch die Digitalisierung sind diese Annahmen nur noch eingeschr\u00e4nkt g\u00fcltig und werden hier erweitert und diskutiert. In dem Zusammenhang ist es erforderlich, den Spurenbegriff grundlegend zu \u00fcberdenken. Gleichzeitig werfen der st\u00e4ndige technische Fortschritt und die immer gr\u00f6\u00dfer werdende Flut von auszuwertenden Daten die Ermittlungsbeh\u00f6rden immer wieder zur\u00fcck. Dieser Entwicklung ist nur durch Automatisierung Herr zu werden. Verfahren der K\u00fcnstlichen Intelligenz k\u00f6nnen und werden die Ermittlungsbeh\u00f6rden zuk\u00fcnftig dabei zunehmend unterst\u00fctzen.<\/jats:p>","DOI":"10.1007\/s00287-021-01393-5","type":"journal-article","created":{"date-parts":[[2021,9,4]],"date-time":"2021-09-04T00:04:45Z","timestamp":1630713885000},"page":"355-363","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Die Enkel von Locard"],"prefix":"10.1007","volume":"44","author":[{"given":"Roman","family":"Povalej","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Heiko","family":"Rittelmeier","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Johannes","family":"F\u00e4hndrich","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Silvio","family":"Berner","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wilfried","family":"Honekamp","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dirk","family":"Labudde","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,9,3]]},"reference":[{"key":"1393_CR1","first-page":"139","volume-title":"Die Kriminaluntersuchung und ihre wissenschaftlichen Methoden","author":"E Locard","year":"1930","unstructured":"Locard\u00a0E (1930) Die Kriminaluntersuchung und ihre wissenschaftlichen Methoden. Kameradschaft, Berlin, S\u00a0139 (frz. Originalausgabe 1920: Locard, E: L\u2019enqu\u00eate criminelle et les m\u00e9thodes scientifiques)"},{"key":"1393_CR2","doi-asserted-by":"publisher","DOI":"10.1201\/9781420036930","volume-title":"Principles and practice of criminalistics: the profession of forensic science","author":"K Inman","year":"2000","unstructured":"Inman\u00a0K, Rudin\u00a0N (2000) Principles and practice of criminalistics: the profession of forensic science. CRC, Boca Raton"},{"key":"1393_CR3","volume-title":"Forensische Informatik","year":"2015","unstructured":"Dewald\u00a0A, Freiling\u00a0FC (Hrsg) (2015) Forensische Informatik, 2.\u00a0Aufl. Books on Demand, Norderstedt","edition":"2"},{"key":"1393_CR4","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.diin.2006.06.008","volume":"3","author":"A Brinson","year":"2006","unstructured":"Brinson\u00a0A, Robinson\u00a0A, Rogers\u00a0M (2006) A cyber forensics ontology: creating a\u00a0new approach to studying cyber forensics. Digit Investig 3:37\u201343","journal-title":"Digit Investig"},{"issue":"2","key":"1393_CR5","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.1109\/COMST.2019.2962586","volume":"22","author":"M Stoyanova","year":"2020","unstructured":"Stoyanova\u00a0M, Nikoloudakis\u00a0Y, Panagiotakis\u00a0S, Pallis\u00a0E, Markakis\u00a0EK (2020) A survey on the internet of things (IoT) forensics: challenges, approaches, and open issues. IEEE Commun Surv Tutor 22(2):1191\u20131221","journal-title":"IEEE Commun Surv Tutor"},{"key":"1393_CR6","unstructured":"Gletschertraum (2007) Beweislehre \u2013 Der Beweis (Definition). https:\/\/www.gletschertraum.de\/Kriminalistik1\/DerBeweis(Definition).html. Zugegriffen: 14. Mai 2021 (Lehrmaterialien zur Kriminalistik I)"},{"key":"1393_CR7","first-page":"173","volume-title":"Die Aktzeptanz des Rechtsstaats in der Justiz \u2013 37. Strafverteidigertag 2014","author":"C Momsen","year":"2014","unstructured":"Momsen\u00a0C, Hercher\u00a0N (2014) Digitale Beweismittel im Strafprozess \u2013 Eignung, Gewinnung, Verwertung, Revisibilt\u00e4t. In: Die Aktzeptanz des Rechtsstaats in der Justiz \u2013 37. Strafverteidigertag 2014, S\u00a0173\u2013196"},{"key":"1393_CR8","volume-title":"Digital evidence and computer crime. Forensic science, computers, and the Internet","author":"E Casey","year":"2011","unstructured":"Casey\u00a0E (2011) Digital evidence and computer crime. Forensic science, computers, and the Internet, 3.\u00a0Aufl. Academic Press, Waltham","edition":"3"},{"key":"1393_CR9","volume-title":"Forensik in der digitalen Welt: Moderne Methoden der forensischen Fallarbeit in der digitalen und digitalisierten realen Welt","year":"2017","unstructured":"Labudde\u00a0D, Spranger\u00a0M (Hrsg) (2017) Forensik in der digitalen Welt: Moderne Methoden der forensischen Fallarbeit in der digitalen und digitalisierten realen Welt, 1.\u00a0Aufl. Springer Spektrum,","edition":"1"},{"key":"1393_CR10","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.diin.2019.01.002","volume":"28","author":"AH Lone","year":"2019","unstructured":"Lone\u00a0AH, Mir\u00a0RN (2019) Forensic-chain: blockchain based digital forensics chain of custody with PoC in Hyperledger Composer. Digit Investig 28:44\u201355","journal-title":"Digit Investig"},{"key":"1393_CR11","first-page":"83","volume-title":"Polizei-Informatik 2019","author":"N Garbers","year":"2019","unstructured":"Garbers\u00a0N (2019) Erkennung inkriminierter Bilder: Neuronale Netzarchitekturen und Hautanteilfilter im Vergleich. In: Honekamp\u00a0W, K\u00fchne\u00a0E (Hrsg) Polizei-Informatik 2019, S 83\u201399"},{"key":"1393_CR12","first-page":"66","volume-title":"Polizei-Informatik 2018","author":"F Mayer","year":"2018","unstructured":"Mayer\u00a0F, Steinebach\u00a0M (2018) Unterst\u00fctzung bei Bildsichtungen durch Deep Learning. In: Honekamp\u00a0W, Bug\u00a0S (Hrsg) Polizei-Informatik 2018, S 66\u201378"},{"key":"1393_CR13","first-page":"31","volume-title":"Polizei-Informatik 2016","author":"R Schulze","year":"2016","unstructured":"Schulze\u00a0R (2016) LiDaKrA \u2013 Linked-Data Kriminalanalysesystem f\u00fcr die Ermittlungsunterst\u00fctzung. In: Honekamp\u00a0W, Mielke\u00a0J (Hrsg) Polizei-Informatik 2016, S 31\u201334"},{"key":"1393_CR14","doi-asserted-by":"publisher","first-page":"1239","DOI":"10.1007\/978-3-030-44041-1_106","volume-title":"Prevention of DDoS attacks in IoT networks","author":"FE Ouerfelli","year":"2020","unstructured":"Ouerfelli\u00a0FE, Barbaria\u00a0K, Zouari\u00a0B, Fachkha\u00a0C (2020) Prevention of DDoS attacks in IoT networks. International Conference on Advanced Information Networking and Applications (AINA 2020). Springer, Cham, S\u00a01239\u20131250 https:\/\/doi.org\/10.1007\/978-3-030-44041-1_106"},{"key":"1393_CR15","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.diin.2019.03.011","volume":"29","author":"N Sunde","year":"2019","unstructured":"Sunde\u00a0N, Itiel\u00a0ED (2019) Cognitive and human factors in digital forensics: problems, challenges, and the way forward. Digit Investig 29:101\u2013108. https:\/\/doi.org\/10.1016\/j.diin.2019.03.011","journal-title":"Digit Investig"},{"key":"1393_CR16","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.inffus.2019.12.012","volume":"58","author":"AB Arrieta","year":"2020","unstructured":"Arrieta\u00a0AB, D\u00edaz-Rodr\u00edguez\u00a0N, Del Ser\u00a0J, Bennetot\u00a0A, Tabik\u00a0S, Barbado\u00a0A, Garcia\u00a0S, Gil-Lopez\u00a0S, Molina\u00a0D, Benjamins\u00a0R, Chatila\u00a0R, Herrera\u00a0F (2020) Explainable artificial intelligence (XAI): concepts, taxonomies, opportunities and challenges toward responsible AI. Inf Fusion 58:82\u2013115","journal-title":"Inf Fusion"},{"key":"1393_CR17","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.diin.2012.05.002","volume":"9","author":"S Garfinkel","year":"2012","unstructured":"Garfinkel\u00a0S (2012) Lessons learned writing digital forensics tools and managing a\u00a030TB digital evidence corpus. Digit Investig 9:80\u201389","journal-title":"Digit Investig"},{"issue":"Supplement","key":"1393_CR18","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.diin.2010.05.002","volume":"7","author":"G Conti","year":"2010","unstructured":"Conti\u00a0G, Bratus\u00a0S, Shubina\u00a0A, Sangster\u00a0B, Ragsdale\u00a0R, Supan\u00a0M, Lichtenberg\u00a0A, Perez-Alemany\u00a0R (2010) Automated mapping of large binary objects using primitive fragment type classification. Digit Investig 7(Supplement):3\u201312. https:\/\/doi.org\/10.1016\/j.diin.2010.05.002","journal-title":"Digit Investig"},{"key":"1393_CR19","volume-title":"International semantic web conference","author":"B Glimm","year":"2010","unstructured":"Glimm\u00a0B, Horrocks\u00a0I, Motik\u00a0B, Stoilos\u00a0G (2010) Optimising ontology classification. In: International semantic web conference. Springer, Berlin, Heidelberg"},{"key":"1393_CR20","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-030-32361-5_10","volume-title":"Artificial intelligence and law enforcement. Regulating artificial intelligence","author":"T Rademacher","year":"2020","unstructured":"Rademacher\u00a0T (2020) Artificial intelligence and law enforcement. Regulating artificial intelligence. Springer, Cham, S\u00a0225\u2013254"},{"issue":"5","key":"1393_CR21","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MSEC.2019.2925649","volume":"17","author":"S Raaijmakers","year":"2019","unstructured":"Raaijmakers\u00a0S (2019) Artificial intelligence for law enforcement: challenges and opportunities. IEEE Secur Priv 17(5):74\u201377","journal-title":"IEEE Secur Priv"},{"key":"1393_CR22","volume-title":"Text message corpus: applying natural language processing to mobile device forensics","author":"DR O\u2019Day","year":"2013","unstructured":"O\u2019Day\u00a0DR, Ricardo\u00a0AC (2013) Text message corpus: applying natural language processing to mobile device forensics. 2013 IEEE International Conference on Multimedia and Expo Workshops (ICMEW)."},{"key":"1393_CR23","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-3-030-61675-5_11","volume-title":"Machine learning for authorship attribution and cyber forensics","author":"F Iqbal","year":"2020","unstructured":"Iqbal\u00a0F, Debbabi\u00a0M, Fung\u00a0BCM (2020) Artificial intelligence and digital forensics. In: Machine learning for authorship attribution and cyber forensics. Springer, Cham, S\u00a0139\u2013150"},{"key":"1393_CR24","volume-title":"Mining e-mail authorship","author":"O De Vel","year":"2000","unstructured":"De Vel\u00a0O (2000) Mining e\u2011mail authorship. Workshop on Text Mining, ACM International Conference on Knowledge Discovery and Data Mining (KDD\u20192000)."},{"issue":"1","key":"1393_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5121\/mlaij.2015.2101","volume":"2","author":"L McClendon","year":"2015","unstructured":"McClendon\u00a0L, Meghanathan\u00a0N (2015) Using machine learning algorithms to analyze crime data. Mach Learn Appl 2(1):1\u201312. https:\/\/doi.org\/10.5121\/mlaij.2015.2101","journal-title":"Mach Learn Appl"},{"issue":"3","key":"1393_CR26","doi-asserted-by":"crossref","first-page":"e1354","DOI":"10.1002\/widm.1354","volume":"10","author":"O Giles","year":"2020","unstructured":"Giles\u00a0O, Chapman\u00a0B, Speers\u00a0J (2020) Forensic intelligence and the analytical process. Wiley Interdiscip Rev Data Min Knowl Discov 10(3):e1354","journal-title":"Wiley Interdiscip Rev Data Min Knowl Discov"},{"key":"1393_CR27","unstructured":"Chen M, Radford A, Child R, Wu J, Jun H, Dhariwal P, Luan D, Sutskever I (2020) Generative pretraining from pixels. https:\/\/cdn.openai.com\/papers\/Generative_Pretraining_from_Pixels_V2.pdf. Zugegriffen: 14. Mai 2021 (International Conference on Machine Learning)"},{"key":"1393_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69923-3_56","volume-title":"Chinese Conference on Biometric Recognition","author":"Y Zhang","year":"2017","unstructured":"Zhang\u00a0Y, Fu\u00a0H, Dellandr\u00e9a\u00a0E (2017) Adapting convolutional neural networks on the shoeprint retrieval for forensic use. In: Chinese Conference on Biometric Recognition. Springer, Cham https:\/\/doi.org\/10.1007\/978-3-319-69923-3_56"},{"key":"1393_CR29","first-page":"47","volume-title":"Zukunft der Polizei. Trends und Strategien","author":"W Honekamp","year":"2018","unstructured":"Honekamp\u00a0W (2018) Cybercrime: Aktuelle Erscheinungsformen und deren Bek\u00e4mpfung. In: Lange\u00a0HJ, Model\u00a0T, Wendekamm\u00a0M (Hrsg) Zukunft der Polizei. Trends und Strategien. Springer VS, Wiesbaden, S\u00a047\u201359"},{"key":"1393_CR30","unstructured":"Attingo Datenrettung (2020) Gefahr f\u00fcr gel\u00f6schte Daten: TRIM-Befehl bei Solid State Drives. https:\/\/www.attingo.de\/blog\/gefahr-fuer-geloeschte-daten-trim-befehl-bei-solid-state-drives\/. Zugegriffen: 14. Mai 2021"},{"key":"1393_CR31","unstructured":"O&O Software (2019) Benutzerhandbuch O&O SafeErase 12. https:\/\/www.oo-software.com\/de\/docs\/usersguide\/oose14.pdf. Zugegriffen: 14. Mai 2021"},{"key":"1393_CR32","unstructured":"Voges H (2013) Workshop Windows 8.1 \u2013 Verwaltung und Fehlerbehebung. https:\/\/www.netz-weise-it.training\/images\/dokus\/Handout_Wordshop_Windows_8.1.pdf. Zugegriffen: 14. Mai 2021"},{"key":"1393_CR33","volume-title":"X-LXMERT: paint, caption and answer questions with multi-modal transformers","author":"J Cho","year":"2020","unstructured":"Cho\u00a0J, Lu\u00a0J, Schwenk\u00a0D, Hajishirzi\u00a0H, Kembhavi\u00a0A (2020) X\u2011LXMERT: paint, caption and answer questions with multi-modal transformers. 2020 Conference on Empirical Methods in Natural Language Processing (EMNLP)."},{"key":"1393_CR34","series-title":"Lecture notes in computer science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-030-58452-8_13","volume-title":"Computer vision \u2013 ECCV 2020","author":"N Carion","year":"2020","unstructured":"Carion\u00a0N, Massa\u00a0F, Synnaeve\u00a0G, Usunier\u00a0N, Kirillov\u00a0A, Zagoruyko\u00a0S (2020) End-to-end object detection with transformers. In: Vedaldi\u00a0A, Bischof\u00a0H, Brox\u00a0T, Frahm\u00a0JM (Hrsg) Computer vision \u2013 ECCV 2020. Lecture notes in computer science, Bd. 12346. Springer, Cham, S 213\u2013229 https:\/\/doi.org\/10.1007\/978-3-030-58452-8_13"},{"key":"1393_CR35","unstructured":"Chen M, Radford A, Sutskever I (2020) Image GT. https:\/\/openai.com\/blog\/image-gpt\/. Zugegriffen: 14. Mai 2021"},{"key":"1393_CR36","series-title":"Lecture notes in computer science","volume-title":"Explainable AI: interpreting, explaining and visualizing deep learning","year":"2019","unstructured":"Samek\u00a0W, Montavon\u00a0G, Vedaldi\u00a0A, Hansen\u00a0LK, M\u00fcller\u00a0K\u2011R (Hrsg) (2019) Explainable AI: interpreting, explaining and visualizing deep learning, 1.\u00a0Aufl. Lecture notes in computer science, Bd. 11700. Springer, Cham","edition":"1"}],"container-title":["Informatik Spektrum"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00287-021-01393-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00287-021-01393-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00287-021-01393-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T09:03:25Z","timestamp":1699434205000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00287-021-01393-5"}},"subtitle":["Analyse digitaler Spuren in der forensischen Informatik"],"short-title":[],"issued":{"date-parts":[[2021,9,3]]},"references-count":36,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["1393"],"URL":"https:\/\/doi.org\/10.1007\/s00287-021-01393-5","relation":{},"ISSN":["0170-6012","1432-122X"],"issn-type":[{"value":"0170-6012","type":"print"},{"value":"1432-122X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,3]]},"assertion":[{"value":"10 July 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 September 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}