{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T15:38:22Z","timestamp":1726414702945},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,11,21]],"date-time":"2022-11-21T00:00:00Z","timestamp":1668988800000},"content-version":"vor","delay-in-days":81,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Hochschule der Polizei Baden-W\u00fcrttemberg"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["K\u00fcnstl Intell"],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1007\/s13218-022-00777-3","type":"journal-article","created":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T18:05:04Z","timestamp":1669140304000},"page":"121-124","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Special Issue on Application of AI in Digital Forensics"],"prefix":"10.1007","volume":"36","author":[{"given":"Johannes","family":"F\u00e4hndrich","sequence":"first","affiliation":[]},{"given":"Wilfried","family":"Honekamp","sequence":"additional","affiliation":[]},{"given":"Roman","family":"Povalej","sequence":"additional","affiliation":[]},{"given":"Heiko","family":"Rittelmeier","sequence":"additional","affiliation":[]},{"given":"Silvio","family":"Berner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,21]]},"reference":[{"key":"777_CR1","unstructured":"BSI (2021) Die Lage der IT-Sicherheit in Deutschland. http:\/\/www.bmi.bund.de\/SharedDocs\/downloads\/DE\/publikationen\/themen\/it-digitalpolitik\/bsi-lagebericht-cybersicherheit-2021.pdf;jsessionid=90C4A17D4F4086D74E308B211D0A66C1.2_cid287?__blob=publicationFile&v=3. Accessed 11 Apr 2022"},{"key":"777_CR2","first-page":"1","volume":"9","author":"M Spranger","year":"2016","unstructured":"Spranger M, Heinke F, Appelt L, Puder M, Labudde D (2016) MoNA: automated identification of evidence in forensic short messages. Int J Adv Secur 9:1","journal-title":"Int J Adv Secur"},{"key":"777_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-61675-5","volume-title":"Machine learning for authorship attribution and cyber forensics","author":"F Iqbal","year":"2020","unstructured":"Iqbal F, Debbabi M, Fung BC (2020) Machine learning for authorship attribution and cyber forensics. Springer, Berlin"},{"key":"777_CR4","unstructured":"De Vel O (2000) Mining e-mail authorship. In: Proceedings of the workshop on text mining, ACM international conference on knowledge discovery and data mining (KDD\u20192000). Citeseer"},{"issue":"1","key":"777_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.18642\/ijamml_7100121446","volume":"2","author":"L McClendon","year":"2015","unstructured":"McClendon L, Meghanathan N (2015) Using machine learning algorithms to analyze crime data. Mach Learn Appl Int J (MLAIJ) 2(1):1\u201312","journal-title":"Mach Learn Appl Int J (MLAIJ)"},{"key":"777_CR6","unstructured":"Kohavi R et al (1995) A study of cross-validation and bootstrap for accuracy estimation and model selection. In: Ijcai, vol 14. Montreal, Canada, pp 1137\u20131145"},{"issue":"1","key":"777_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1021\/ci0342472","volume":"44","author":"DM Hawkins","year":"2004","unstructured":"Hawkins DM (2004) The problem of overfitting. J Chem Inf Comput Sci 44(1):1\u201312","journal-title":"J Chem Inf Comput Sci"},{"key":"777_CR8","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.diin.2012.05.002","volume":"9","author":"S Garfinkel","year":"2012","unstructured":"Garfinkel S (2012) Lessons learned writing digital forensics tools and managing a 30 TB digital evidence corpus. Digit Investig 9:80\u201389","journal-title":"Digit Investig"},{"key":"777_CR9","doi-asserted-by":"crossref","unstructured":"Glimm B, Horrocks I, Motik B, Stoilos G (2010) Optimising ontology classification. In: International semantic web conference. Springer, Berlin, pp 225\u2013240","DOI":"10.1007\/978-3-642-17746-0_15"},{"key":"777_CR10","doi-asserted-by":"crossref","unstructured":"Rademacher T (2020) Artificial intelligence and law enforcement. In: Regulating artificial intelligence. Springer, Berlin, pp 225\u2013254","DOI":"10.1007\/978-3-030-32361-5_10"},{"issue":"5","key":"777_CR11","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MSEC.2019.2925649","volume":"17","author":"S Raaijmakers","year":"2019","unstructured":"Raaijmakers S (2019) Artificial intelligence for law enforcement: challenges and opportunities. IEEE Secur Priv 17(5):74\u201377","journal-title":"IEEE Secur Priv"},{"issue":"5","key":"777_CR12","first-page":"355","volume":"44","author":"R Povalej","year":"2021","unstructured":"Povalej R, Rittelmeier H, F\u00e4hndrich J, Berner S, Honekamp W, Labudde D (2021) Die Enkel von Locard. Inf Spekt 44(5):355\u2013363","journal-title":"Inf Spekt"},{"key":"777_CR13","unstructured":"Chen M, Radford A (2020) Sutskever: image GPT. https:\/\/openai.com\/blog\/image-gpt\/. Accessed 11 Apr 2022"},{"key":"777_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-28954-6","volume-title":"Explainable AI: interpreting, explaining and visualizing deep learning","author":"W Samek","year":"2019","unstructured":"Samek W, Montavon G, Vedaldi A, Hansen LK, M\u00fcller K-R (2019) Explainable AI: interpreting, explaining and visualizing deep learning, vol 11700. Springer, Berlin"}],"container-title":["KI - K\u00fcnstliche Intelligenz"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13218-022-00777-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13218-022-00777-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13218-022-00777-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T03:32:59Z","timestamp":1670815979000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13218-022-00777-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9]]},"references-count":14,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["777"],"URL":"https:\/\/doi.org\/10.1007\/s13218-022-00777-3","relation":{},"ISSN":["0933-1875","1610-1987"],"issn-type":[{"type":"print","value":"0933-1875"},{"type":"electronic","value":"1610-1987"}],"subject":[],"published":{"date-parts":[[2022,9]]},"assertion":[{"value":"21 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}