{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T14:09:23Z","timestamp":1746194963597,"version":"3.37.3"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2012M3A2A1051106"],"award-info":[{"award-number":["2012M3A2A1051106"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s11227-017-2205-5","type":"journal-article","created":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T12:36:00Z","timestamp":1512131760000},"page":"6618-6632","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Mobile forensic reference set (MFReS) and mobile forensic investigation for android devices"],"prefix":"10.1007","volume":"74","author":[{"given":"Dohyun","family":"Kim","sequence":"first","affiliation":[]},{"given":"Yunho","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Sangjin","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,1]]},"reference":[{"key":"2205_CR1","unstructured":"ISO\/IEC 27043 (2015) Information technology: security techniques: incident investigation principles and processes"},{"key":"2205_CR2","unstructured":"Raymond EM, Venter HS (2014) Mobile forensics using the harmonised digital forensic investigation process. In: 2014 Information security for South Africa. IEEE"},{"key":"2205_CR3","doi-asserted-by":"crossref","unstructured":"Omeleze S, Venter HS (2013) Testing the harmonised digital forensic investigation process model-using an Android mobile phone. In: 2013 Information security for South Africa. IEEE","DOI":"10.1109\/ISSA.2013.6641063"},{"key":"2205_CR4","unstructured":"NIST Special Publication 800-101 Revision 1, Guidelines on Mobile Device Forensics (2014)"},{"key":"2205_CR5","unstructured":"NIST NSRL (2016). http:\/\/www.nsrl.nist.gov\/"},{"key":"2205_CR6","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.diin.2006.08.010","volume":"3","author":"S Mead","year":"2006","unstructured":"Mead S (2006) Unique file identification in the national software reference library. Digit Investig 3:138\u2013150","journal-title":"Digit Investig"},{"key":"2205_CR7","doi-asserted-by":"crossref","first-page":"S108","DOI":"10.1016\/j.diin.2009.06.005","volume":"6","author":"K Kim","year":"2009","unstructured":"Kim K, Park S, Chang T, Lee C, Back S (2009) Lessons learned from the construction of a Korean software reference data set for digital forensics. Digit Investig 6:S108\u2013113","journal-title":"Digit Investig"},{"key":"2205_CR8","doi-asserted-by":"crossref","unstructured":"Ruback Marcelo, Hoel Bruno, Ralha Celia (2012) A new approach for creating forensic hashsets. In: Advances in digital forensics VIII: IFIP AICT, vol 383 pp 83\u201397","DOI":"10.1007\/978-3-642-33962-2_6"},{"key":"2205_CR9","doi-asserted-by":"crossref","first-page":"S131","DOI":"10.1016\/j.diin.2012.05.009","volume":"9","author":"NC Rowe","year":"2012","unstructured":"Rowe NC (2012) Testing the national software reference library. Digit Investig 9:S131\u2013138","journal-title":"Digit Investig"},{"key":"2205_CR10","unstructured":"Telegram (2016). https:\/\/telegram.org\/"},{"key":"2205_CR11","unstructured":"KakaoTalk (2016). http:\/\/www.kakao.com\/talk\/"},{"key":"2205_CR12","unstructured":"ApkTool (2016). https:\/\/ibotpeaches.github.io\/Apktool\/"},{"key":"2205_CR13","unstructured":"dex2jar (2016). http:\/\/sourceforge.net\/projects\/dex2jar\/"},{"key":"2205_CR14","unstructured":"JD Project (2016). http:\/\/jd.benow.ca\/"},{"key":"2205_CR15","unstructured":"JEB Decompiler (2016). https:\/\/www.pnfsoftware.com\/"},{"key":"2205_CR16","doi-asserted-by":"crossref","unstructured":"Ohana DJ, Shashidhar N (2013) Do private and portable web browsers leave incriminating evidence?: a forensic analysis of residual artifacts from private and portable web browsing sessions. EURASIP J Inf Secur","DOI":"10.1186\/1687-417X-2013-6"},{"issue":"2","key":"2205_CR17","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/TIFS.2006.873602","volume":"1","author":"J Lukas","year":"2006","unstructured":"Lukas J, Fridrich J, Goljan M (2006) Digital camera identification from sensor pattern noise. IEEE Trans Inf Forensics Secur 1(2):205\u2013214","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2205_CR18","doi-asserted-by":"crossref","first-page":"S21","DOI":"10.1016\/j.diin.2008.05.004","volume":"5","author":"JD Kornblum","year":"2008","unstructured":"Kornblum JD (2008) Using JPEG quantization tables to identify imagery processed by software. Digit Investig 5:S21\u2013S25","journal-title":"Digit Investig"},{"key":"2205_CR19","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1016\/j.dsp.2015.10.002","volume":"48","author":"TH Thai","year":"2016","unstructured":"Thai TH, Retraint F, Cogranne R (2016) Camera model identification based on the generalized noise model in natural images. Digit Signal Process 48:285\u2013297","journal-title":"Digit Signal Process"},{"issue":"2","key":"2205_CR20","doi-asserted-by":"crossref","first-page":"359","DOI":"10.13089\/JKIISC.2016.26.2.359","volume":"26","author":"MS Kim","year":"2016","unstructured":"Kim MS, Jung D, Lee S (2016) Building a database of DQT information to identify a source of the smartphone JPEG image file. Korea Inst Inf Secur Cryptol 26(2):359\u2013367","journal-title":"Korea Inst Inf Secur Cryptol"},{"key":"2205_CR21","unstructured":"The Sleuth Kit (TSK) & Autopsy (2016) Open source digital forensics tools. http:\/\/www.sleuthkit.org\/"},{"key":"2205_CR22","unstructured":"md5deep and hashdeep (2016). http:\/\/md5deep.sourceforge.net\/#download\/"},{"key":"2205_CR23","doi-asserted-by":"crossref","unstructured":"Blondel VD, Decuyper A, Krings G (2015) A survey of results on mobile phone datasets analysis. EPJ Data Sci","DOI":"10.1140\/epjds\/s13688-015-0046-0"},{"key":"2205_CR24","doi-asserted-by":"crossref","first-page":"14971","DOI":"10.1007\/s11042-016-3651-4","volume":"75","author":"J Choi","year":"2016","unstructured":"Choi J, Lee S (2016) A study of user relationships in smartphone forensics. Multimed Tools Appl 75:14971\u201314983","journal-title":"Multimed Tools Appl"},{"key":"2205_CR25","unstructured":"NIST Computer Forensics Tool Testing Program (2016). http:\/\/www.cftt.nist.gov\/"},{"key":"2205_CR26","doi-asserted-by":"crossref","unstructured":"Talib A (2016) Towards early software reliability prediction for computer forensic tools (case study). Springerplus","DOI":"10.1186\/s40064-016-2539-0"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-017-2205-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-017-2205-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-017-2205-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T03:42:12Z","timestamp":1570419732000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-017-2205-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,1]]},"references-count":26,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["2205"],"URL":"https:\/\/doi.org\/10.1007\/s11227-017-2205-5","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2017,12,1]]}}}