{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T07:24:47Z","timestamp":1743146687442,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030170646"},{"type":"electronic","value":"9783030170653"}],"license":[{"start":{"date-parts":[[2019,4,10]],"date-time":"2019-04-10T00:00:00Z","timestamp":1554854400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-17065-3_32","type":"book-chapter","created":{"date-parts":[[2019,4,9]],"date-time":"2019-04-09T05:38:22Z","timestamp":1554788302000},"page":"318-328","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Filtering Email Addresses, Credit Card Numbers and Searching for Bitcoin Artifacts with the Autopsy Digital Forensics Software"],"prefix":"10.1007","author":[{"given":"Patricio","family":"Domingues","sequence":"first","affiliation":[]},{"given":"Miguel","family":"Frade","sequence":"additional","affiliation":[]},{"given":"Jo\u00e3o Mota","family":"Parreira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,10]]},"reference":[{"issue":"2","key":"32_CR1","doi-asserted-by":"crossref","first-page":"40","DOI":"10.51983\/ajeat-2016.5.2.800","volume":"5","author":"PK Paul","year":"2016","unstructured":"Paul, P.K., Bhuimali, A., Shivraj, K.S.: Internet corporation for assigned names and numbers: an overview. Asian J. Eng. Appl. Technol. 5(2), 40\u201343 (2016)","journal-title":"Asian J. Eng. Appl. Technol."},{"key":"32_CR2","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.eswa.2015.12.030","volume":"51","author":"AC Bahnsen","year":"2016","unstructured":"Bahnsen, A.C., Aouada, D., Stojanovic, A., Ottersten, B.: Feature engineering strategies for credit card fraud detection. Expert Syst. Appl. 51, 134\u2013142 (2016)","journal-title":"Expert Syst. Appl."},{"key":"32_CR3","unstructured":"Duchamp, D., et al.: Prefetching hyperlinks. In: USENIX Symposium on Internet Technologies and Systems, pp. 12\u201323 (1999)"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Elz, R., Bush, R.: Clarifications to the DNS specification. Technical report (1997)","DOI":"10.17487\/rfc2181"},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"Eskandari, S., Leoutsarakos, A., Mursch, T., Clark, J.: A first look at browser-based Cryptojacking. arXiv preprint arXiv:1803.02887 (2018)","DOI":"10.1109\/EuroSPW.2018.00014"},{"key":"32_CR6","unstructured":"Garfinkel, S.: AFF and AFF4: where we are, where we are going, and why it matters to you. In: Sleuth Kit and Open Source Digital Forensics Conference (2010)"},{"key":"32_CR7","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.cose.2012.09.011","volume":"32","author":"SL Garfinkel","year":"2013","unstructured":"Garfinkel, S.L.: Digital media triage with bulk data analysis and bulk $$\\_$$ extractor. Comput. Secur. 32, 56\u201372 (2013)","journal-title":"Comput. Secur."},{"issue":"5","key":"32_CR8","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1109\/TNET.2002.803905","volume":"10","author":"J Jung","year":"2002","unstructured":"Jung, J., Sit, E., Balakrishnan, H., Morris, R.: DNS performance and the effectiveness of caching. IEEE\/ACM Trans. Netw. 10(5), 589\u2013603 (2002)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"32_CR9","unstructured":"Klensin, J.: RFC 5321: simple mail transfer protocol (2008). https:\/\/tools.ietf.org\/html\/rfc5321"},{"key":"32_CR10","doi-asserted-by":"crossref","unstructured":"Liao, K., Zhao, Z., Doup\u00e9, A., Ahn, G.J.: Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin. In: 2016 APWG Symposium on Electronic Crime Research (eCrime), pp. 1\u201313. IEEE (2016)","DOI":"10.1109\/ECRIME.2016.7487938"},{"key":"32_CR11","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)"},{"issue":"5","key":"32_CR12","first-page":"964","volume":"4","author":"EP Panchal","year":"2013","unstructured":"Panchal, E.P.: Extraction of persistence and volatile forensics evidences from computer system. Int. J. Comput. Trends Technol. (IJCTT) 4(5), 964\u2013968 (2013)","journal-title":"Int. J. Comput. Trends Technol. (IJCTT)"},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"Postel, J.: Domain name system structure and delegation (1994)","DOI":"10.17487\/rfc1591"},{"key":"32_CR14","unstructured":"Resnick, P.: RFC 5322: Internet message format (2008). https:\/\/tools.ietf.org\/html\/rfc5322"},{"issue":"2","key":"32_CR15","first-page":"153","volume":"11","author":"NC Rowe","year":"2016","unstructured":"Rowe, N.C., Schwamm, R., McCarrin, M.R., Gera, R.: Making sense of email addresses on drives. J. Digit. Forensics Secur. Law: JDFSL 11(2), 153 (2016)","journal-title":"J. Digit. Forensics Secur. Law: JDFSL"},{"issue":"1","key":"32_CR16","first-page":"24","volume":"30","author":"W Wachira","year":"2015","unstructured":"Wachira, W., Waweru, K., Nyaga, L.: Transposition error detection in Luhn\u2019s algorithm. Int. J. Pure Appl. Sci. Technol. 30(1), 24 (2015)","journal-title":"Int. J. Pure Appl. Sci. Technol."}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2018)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-17065-3_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T14:37:09Z","timestamp":1694788629000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-17065-3_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,10]]},"ISBN":["9783030170646","9783030170653"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-17065-3_32","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,4,10]]},"assertion":[{"value":"10 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SoCPaR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Soft Computing and Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Porto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"socpar2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/socpar18\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}