{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,7]],"date-time":"2024-05-07T00:16:27Z","timestamp":1715040987470},"reference-count":17,"publisher":"Elsevier","isbn-type":[{"value":"9780128046296","type":"print"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1016\/b978-0-12-804629-6.00009-2","type":"book-chapter","created":{"date-parts":[[2016,9,24]],"date-time":"2016-09-24T20:06:16Z","timestamp":1474747576000},"page":"205-216","source":"Crossref","is-referenced-by-count":0,"title":["Timeline Analysis for Digital Evidence on MTK-Based Shanzhai Mobile Phone"],"prefix":"10.1016","author":[{"given":"J.","family":"Fang","sequence":"first","affiliation":[]},{"given":"Z.L.","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"S.","family":"Li","sequence":"additional","affiliation":[]},{"given":"S.-M.","family":"Yiu","sequence":"additional","affiliation":[]},{"given":"L.C.K.","family":"Hui","sequence":"additional","affiliation":[]},{"given":"K.-P.","family":"Chow","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/B978-0-12-804629-6.00009-2_bb0010","series-title":"Guidelines on Mobile Device Forensics","first-page":"1","author":"Ayers","year":"2014"},{"issue":"4","key":"10.1016\/B978-0-12-804629-6.00009-2_bb0015","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1016\/j.diin.2013.10.003","article-title":"A critical review of 7 years of mobile device forensics","volume":"10","author":"Barmpatsalou","year":"2013","journal-title":"Digit. Investig."},{"issue":"1","key":"10.1016\/B978-0-12-804629-6.00009-2_bb0020","first-page":"1","article-title":"Forensic data recovery from flash memory","volume":"1","author":"Breeuwsma","year":"2007","journal-title":"Small Scale Digit. Device Forensics J."},{"issue":"6","key":"10.1016\/B978-0-12-804629-6.00009-2_bb0025","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/MSP.2006.148","article-title":"Cryptography, law enforcement, and mobile communications","volume":"4","author":"Gratzer","year":"2006","journal-title":"IEEE Secur. Privacy"},{"key":"10.1016\/B978-0-12-804629-6.00009-2_bb0030","series-title":"Android Forensics: Investigation, Analysis and Mobile Security for Google Android","author":"Hoog","year":"2011"},{"key":"10.1016\/B978-0-12-804629-6.00009-2_bb0035","series-title":"iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices","author":"Hoog","year":"2011"},{"issue":"3","key":"10.1016\/B978-0-12-804629-6.00009-2_bb0040","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.diin.2010.02.001","article-title":"Windows mobile advanced forensics","volume":"6","author":"Klaver","year":"2010","journal-title":"Digit. Investig."},{"key":"10.1016\/B978-0-12-804629-6.00009-2_bb0045","series-title":"Dual-core smartphones: The next mobile arms race","author":"Lomas","year":"2011"},{"key":"10.1016\/B978-0-12-804629-6.00009-2_bb0050","unstructured":"McCarthy, P., 2005. Forensic analysis of mobile phones. BS CIS Thesis, Mawson Lakes."},{"issue":"7","key":"10.1016\/B978-0-12-804629-6.00009-2_bb0055","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MSPEC.2010.5491013","article-title":"Cellphone crime solvers","volume":"47","author":"Mislan","year":"2010","journal-title":"IEEE Spectr."},{"key":"10.1016\/B978-0-12-804629-6.00009-2_bb0060","article-title":"Acquisition of a Symbian smart phone\u2019s content with an on-phone forensic tool","volume":"8","author":"Mokhonoana","year":"2007"},{"key":"10.1016\/B978-0-12-804629-6.00009-2_bb0065","series-title":"Fake iPhone 4G mobile phone hits Shanzhai market","author":"Nanyang","year":"2010"},{"key":"10.1016\/B978-0-12-804629-6.00009-2_bb0070","series-title":"Expert: \u2018flasher\u2019 technology digs deeper for digital evidence","year":"2007"},{"key":"10.1016\/B978-0-12-804629-6.00009-2_bb0075","doi-asserted-by":"crossref","first-page":"S14","DOI":"10.1016\/j.diin.2011.05.003","article-title":"Toward a general collection methodology for android devices","volume":"8","author":"Vidas","year":"2011","journal-title":"Digit. Investig."},{"key":"10.1016\/B978-0-12-804629-6.00009-2_bb0080","series-title":"Worldwide mobile phone market grew 20% in q1 2011, fueled by smartphone boom","author":"Wauters","year":"2011"},{"key":"10.1016\/B978-0-12-804629-6.00009-2_bb0085","first-page":"191","article-title":"Forensic analysis of mobile phone internal memory","author":"Willassen","year":"2005"},{"key":"10.1016\/B978-0-12-804629-6.00009-2_bb0090","first-page":"34","article-title":"The research of MTK mobile phones flash file system recovery","volume":"11","author":"Zhang","year":"2010","journal-title":"Netinfo Secur."}],"container-title":["Mobile Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:B9780128046296000092?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:B9780128046296000092?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,9,8]],"date-time":"2018-09-08T04:22:53Z","timestamp":1536380573000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/B9780128046296000092"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9780128046296"],"references-count":17,"URL":"https:\/\/doi.org\/10.1016\/b978-0-12-804629-6.00009-2","relation":{},"subject":[],"published":{"date-parts":[[2017]]}}}