{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T08:51:11Z","timestamp":1762505471841,"version":"3.37.0"},"reference-count":40,"publisher":"Elsevier BV","issue":"1-2","license":[{"start":{"date-parts":[[2009,9,1]],"date-time":"2009-09-01T00:00:00Z","timestamp":1251763200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Digital Investigation"],"published-print":{"date-parts":[[2009,9]]},"DOI":"10.1016\/j.diin.2009.02.003","type":"journal-article","created":{"date-parts":[[2009,4,20]],"date-time":"2009-04-20T08:47:39Z","timestamp":1240217259000},"page":"71-81","source":"Crossref","is-referenced-by-count":12,"title":["Robust performance testing for digital forensic tools"],"prefix":"10.1016","volume":"6","author":[{"given":"Lei","family":"Pan","sequence":"first","affiliation":[]},{"given":"Lynn M.","family":"Batten","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.diin.2009.02.003_bib2","doi-asserted-by":"crossref","unstructured":"Jason Beckett, Jill Slay. Digital forensics: validation and verification in a dynamic work environment. 40th Annual Hawaii International Conference on System Sciences (HICSS'07); 2007. p. 266a.","DOI":"10.1109\/HICSS.2007.175"},{"issue":"4","key":"10.1016\/j.diin.2009.02.003_bib3","article-title":"Defining digital forensic examination and analysis tools using abstraction layers","volume":"1","author":"Brian Carrier","year":"2003","journal-title":"International Journal of Digital Evidence"},{"issue":"2","key":"10.1016\/j.diin.2009.02.003_bib4","article-title":"Error, uncertainty, and loss in digital evidence","volume":"1","author":"Casey","year":"2002","journal-title":"International Journal of Digital Evidence"},{"year":"1996","series-title":"CRC handbook of combinatorial designs","author":"Colbourn","key":"10.1016\/j.diin.2009.02.003_bib5"},{"issue":"7","key":"10.1016\/j.diin.2009.02.003_bib6","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1109\/32.605761","article-title":"The AETG system: an approach to testing based on combinatorial design","volume":"23","author":"Cohen","year":"1997","journal-title":"IEEE Transactions on Software Engineering"},{"year":"2001","series-title":"Disk imaging specifications","author":"CFTT group from NIST","key":"10.1016\/j.diin.2009.02.003_bib7"},{"year":"2004","series-title":"Digital data acquisition tool specification","author":"CFTT group from NIST","key":"10.1016\/j.diin.2009.02.003_bib8"},{"year":"2005","series-title":"Digital data acquisition tool test assertions and test plan","author":"CFTT group from NIST","key":"10.1016\/j.diin.2009.02.003_bib9"},{"issue":"4","key":"10.1016\/j.diin.2009.02.003_bib10","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1109\/TSE.1984.5010257","article-title":"An evaluation of random testing","volume":"10","author":"Duran","year":"1984","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.diin.2009.02.003_bib11","doi-asserted-by":"crossref","unstructured":"Barbara Endicott-Popovsky, Fluckiger JD, Deborah Frincke. Establishing tap reliability in expert witness testimony: using scenarios to identify calibration needs. In: Proceedings of the 2nd International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2007; 2007. p. 131\u201344.","DOI":"10.1109\/SADFE.2007.10"},{"issue":"5","key":"10.1016\/j.diin.2009.02.003_bib12","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1109\/32.815325","article-title":"Partition testing vs. random testing: the influence of uncertainty","volume":"25","author":"Gutjahr","year":"1999","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"12","key":"10.1016\/j.diin.2009.02.003_bib14","doi-asserted-by":"crossref","first-page":"1402","DOI":"10.1109\/32.62448","article-title":"Partition testing does not inspire confidence","volume":"16","author":"Hamlet","year":"1990","journal-title":"IEEE Transactions on Software Engineering"},{"year":"2004","series-title":"Software engineering \u2013 product quality 9126","author":"ISO\/IEC","key":"10.1016\/j.diin.2009.02.003_bib15"},{"year":"1991","series-title":"The art of computer systems performance analysis: techniques for experimental design measurement, simulation, and modeling","author":"Jain","key":"10.1016\/j.diin.2009.02.003_bib16"},{"issue":"2","key":"10.1016\/j.diin.2009.02.003_bib17","article-title":"The Linux kernel and the forensic acquisition of hard discs with an odd number of sectors","volume":"3","author":"Kornblum","year":"2004","journal-title":"International Journal of Digital Evidence"},{"year":"2000","series-title":"An introduction to statistical methods and data analysis","author":"Lyman Ott","key":"10.1016\/j.diin.2009.02.003_bib25"},{"year":"1984","series-title":"The statistical analysis of experimental data","author":"Mandel","key":"10.1016\/j.diin.2009.02.003_bib18"},{"key":"10.1016\/j.diin.2009.02.003_bib19","doi-asserted-by":"crossref","unstructured":"Marziale L, Richard GG III, Roussev V. Massive threading: using GPUs to increase the performance of digital forensics tools. In: Proceedings of the 7th Annual Digital Forensics Research Workshop (DFRWS 2007); 2007.","DOI":"10.1016\/j.diin.2007.06.014"},{"issue":"3","key":"10.1016\/j.diin.2009.02.003_bib20","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/1368506.1368512","article-title":"Software issues in digital forensics","volume":"42","author":"McDonald","year":"2008","journal-title":"SIGOPS Operating Systems Review"},{"key":"10.1016\/j.diin.2009.02.003_bib21","doi-asserted-by":"crossref","unstructured":"Soumen Maity, Amiya Nayak. Improved test generation algorithms for pair-wise testing. In: Proceedings of the 16th IEEE International Symposium on Software Reliability Engineering; 2005. p. 235\u201344.","DOI":"10.1109\/ISSRE.2005.23"},{"issue":"2","key":"10.1016\/j.diin.2009.02.003_bib22","article-title":"Computer forensics: the need for standardization and certification","volume":"3","author":"Meyers","year":"2004","journal-title":"International Journal of Digital Evidence"},{"key":"10.1016\/j.diin.2009.02.003_bib23","doi-asserted-by":"crossref","unstructured":"George Mohay. Technical challenges and directions for digital forensics. In: Proceedings of the 1st International Workshop on Systematic Approaches to Digital Forensic Engineering SADFE 2005; 2005. p. 155\u201361.","DOI":"10.1109\/SADFE.2005.24"},{"key":"10.1016\/j.diin.2009.02.003_bib24","unstructured":"NIST\/SEMATECH. e-Handbook of statistical methods. http:\/\/www.itl.nist.gov\/div898\/handbook\/; 2006."},{"key":"10.1016\/j.diin.2009.02.003_bib26","doi-asserted-by":"crossref","unstructured":"Lei Pan, Lynn M. Batten. A lower bound on effective performance testing for digital forensic tools. In: Proceedings of the 2nd International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'07); 2007. p. 117\u201330.","DOI":"10.1109\/SADFE.2007.2"},{"issue":"3","key":"10.1016\/j.diin.2009.02.003_bib27","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1145\/1368506.1368521","article-title":"Computer forensics in forensis","volume":"42","author":"Peisert","year":"2008","journal-title":"SIGOPS Operating Systems Review"},{"key":"10.1016\/j.diin.2009.02.003_bib28","unstructured":"Stuart C. Reid. An empirical analysis of equivalence partitioning, boundary value analysis and random testing. In: Proceedings of the 4th International Software Metrics Symposium (METRICS'97); 1997. p. 64\u201373."},{"key":"10.1016\/j.diin.2009.02.003_bib29","unstructured":"Jessica Reust. DFRWS 2005 Workshop Report. Online at http:\/\/www.dfrws.org\/2005\/download\/2005final.pdf; 2006."},{"issue":"2","key":"10.1016\/j.diin.2009.02.003_bib1","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1145\/356876.356879","article-title":"Validation, verification, and testing of computer software","volume":"14","author":"Richards Adrion","year":"1982","journal-title":"ACM Computing Surveys"},{"issue":"2","key":"10.1016\/j.diin.2009.02.003_bib30","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1093\/biomet\/70.2.421","article-title":"Robust statistical analysis of interlaboratory studies","volume":"70","author":"Rocke","year":"1983","journal-title":"Biometrika"},{"year":"1999","series-title":"Orthogonal arrays: theory and applications","author":"Samad Hedayat","key":"10.1016\/j.diin.2009.02.003_bib13"},{"key":"10.1016\/j.diin.2009.02.003_bib31","unstructured":"Neil J.A. Sloane. A library of orthogonal arrays. Available from: http:\/\/www.research.att.com\/njas\/oadir\/index.html."},{"year":"1986","series-title":"Introduction to quality engineering: designing quality into produces and processes","author":"Taguchi","key":"10.1016\/j.diin.2009.02.003_bib32"},{"year":"2004","series-title":"Taguchi's quality engineering handbook","author":"Taguchi","key":"10.1016\/j.diin.2009.02.003_bib33"},{"issue":"1","key":"10.1016\/j.diin.2009.02.003_bib34","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1109\/32.979992","article-title":"A test generation strategy for pairwise testing","volume":"28","author":"Tai","year":"2002","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.diin.2009.02.003_bib35","doi-asserted-by":"crossref","unstructured":"Tom Wilsdon, Jill Slay. Digital forensics: exploring validation, verification and certification. In: Proceedings of the 1st International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'05); 2005. p. 48\u201355.","DOI":"10.1109\/SADFE.2005.11"},{"key":"10.1016\/j.diin.2009.02.003_bib36","unstructured":"Tom Wilsdon, Jill Slay. Forensic computing tool testing utilizing black box techniques. In: Proceedings of the 4th Australian Digital Forensics Conference; 2006."},{"key":"10.1016\/j.diin.2009.02.003_bib37","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1198\/004017002188618554","article-title":"An algorithm for constructing orthogonal and nearly-orthogonal arrays with mixed levels and small runs","volume":"44","author":"Xu","year":"2002","journal-title":"Technometrics"},{"key":"10.1016\/j.diin.2009.02.003_bib38","unstructured":"Huifang Yin, Zemen Lebne-Dengely, Yashwant K. Malaiya. Automatic test generation using checkpoint encoding and antirandom testing. In: Proceedings of the 8th International Symposium on Software Reliability Engineering; 1997. p. 84\u201395."},{"key":"10.1016\/j.diin.2009.02.003_bib39","article-title":"Statistical techniques for collaborative tests","volume":"vol. 63","author":"Youden","year":"1975"},{"issue":"1","key":"10.1016\/j.diin.2009.02.003_bib40","doi-asserted-by":"crossref","first-page":"99","DOI":"10.2307\/3315906","article-title":"Robust estimation and design procedures for the random effects model","volume":"31","author":"Zhou","year":"2003","journal-title":"The Canadian Journal of Statistics"}],"container-title":["Digital Investigation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1742287609000279?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1742287609000279?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,2,9]],"date-time":"2025-02-09T02:43:37Z","timestamp":1739069017000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1742287609000279"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9]]},"references-count":40,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2009,9]]}},"alternative-id":["S1742287609000279"],"URL":"https:\/\/doi.org\/10.1016\/j.diin.2009.02.003","relation":{},"ISSN":["1742-2876"],"issn-type":[{"type":"print","value":"1742-2876"}],"subject":[],"published":{"date-parts":[[2009,9]]}}}