{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T16:00:13Z","timestamp":1772121613533,"version":"3.50.1"},"reference-count":7,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2009,9,1]],"date-time":"2009-09-01T00:00:00Z","timestamp":1251763200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2019,1,18]],"date-time":"2019-01-18T00:00:00Z","timestamp":1547769600000},"content-version":"vor","delay-in-days":3426,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Digital Investigation"],"published-print":{"date-parts":[[2009,9]]},"DOI":"10.1016\/j.diin.2009.06.008","type":"journal-article","created":{"date-parts":[[2009,8,19]],"date-time":"2009-08-19T08:33:54Z","timestamp":1250670834000},"page":"S78-S87","source":"Crossref","is-referenced-by-count":71,"special_numbering":"S","title":["Computer forensic timeline visualization tool"],"prefix":"10.1016","volume":"6","author":[{"given":"Jens","family":"Olsson","sequence":"first","affiliation":[]},{"given":"Martin","family":"Boldt","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.diin.2009.06.008_bib1","series-title":"Proceedings of the 2005 digital forensic research workshop","article-title":"Design and implementation of zeitline: a forensic timeline","author":"Buchholz","year":"2005"},{"issue":"Suppl. 1","key":"10.1016\/j.diin.2009.06.008_bib2","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/j.diin.2007.06.004","article-title":"A brief study of time","volume":"4","author":"Buchholz","year":"2007","journal-title":"Digital Investigation"},{"key":"10.1016\/j.diin.2009.06.008_bib3","series-title":"File system forensic analysis","author":"Carrier","year":"2005"},{"issue":"3","key":"10.1016\/j.diin.2009.06.008_bib4","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/j.diin.2005.07.003","article-title":"The windows registry as a forensic resource","volume":"2","author":"Carvey","year":"2005","journal-title":"Digital Investigation"},{"key":"10.1016\/j.diin.2009.06.008_bib5","series-title":"Digital evidence and computer crime","author":"Casey","year":"2004"},{"key":"10.1016\/j.diin.2009.06.008_bib6","author":"Log Files \u2013 Apache HTTP Server"},{"issue":"3","key":"10.1016\/j.diin.2009.06.008_bib8","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1016\/j.diin.2006.07.001","article-title":"The windows registry as a forensic artefact: illustrating evidence collection for internet usage","volume":"3","author":"Mee","year":"2006","journal-title":"Digital Investigation"}],"container-title":["Digital Investigation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1742287609000425?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1742287609000425?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,1,18]],"date-time":"2019-01-18T11:01:43Z","timestamp":1547809303000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1742287609000425"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9]]},"references-count":7,"alternative-id":["S1742287609000425"],"URL":"https:\/\/doi.org\/10.1016\/j.diin.2009.06.008","relation":{},"ISSN":["1742-2876"],"issn-type":[{"value":"1742-2876","type":"print"}],"subject":[],"published":{"date-parts":[[2009,9]]}}}