{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T02:21:48Z","timestamp":1767666108417},"reference-count":23,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2009,9,1]],"date-time":"2009-09-01T00:00:00Z","timestamp":1251763200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2019,1,18]],"date-time":"2019-01-18T00:00:00Z","timestamp":1547769600000},"content-version":"vor","delay-in-days":3426,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Digital Investigation"],"published-print":{"date-parts":[[2009,9]]},"DOI":"10.1016\/j.diin.2009.06.011","type":"journal-article","created":{"date-parts":[[2009,8,19]],"date-time":"2009-08-19T08:33:54Z","timestamp":1250670834000},"page":"S48-S56","source":"Crossref","is-referenced-by-count":21,"special_numbering":"S","title":["DEX: Digital evidence provenance supporting reproducibility and comparison"],"prefix":"10.1016","volume":"6","author":[{"given":"Brian Neil","family":"Levine","sequence":"first","affiliation":[]},{"given":"Marc","family":"Liberatore","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.diin.2009.06.011_bib1","doi-asserted-by":"crossref","unstructured":"Alinka W, Bhoedjanga R, Bonczb P, de Vriesb A. XIRAF \u2013XML-based indexing and querying for digital forensics. In: Proc. DFRWS; 2006.","DOI":"10.1016\/j.diin.2006.06.016"},{"issue":"12","key":"10.1016\/j.diin.2009.06.011_bib2","doi-asserted-by":"crossref","first-page":"1491","DOI":"10.1109\/TSE.1985.231893","article-title":"The N-version approach to fault-tolerant software","volume":"SE-11","author":"Avi\u017eeienis","year":"1985","journal-title":"IEEE Trans Software Eng"},{"issue":"1","key":"10.1016\/j.diin.2009.06.011_bib3","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/TDSC.2004.2","article-title":"Basic concepts and taxonomy of dependable and secure computing","volume":"1","author":"Avi\u017eeienis","year":"2004","journal-title":"IEEE Trans Dependable Secure Computing"},{"key":"10.1016\/j.diin.2009.06.011_bib4","series-title":"Netherlands forensic institute develops and publishes open source software","author":"Battistoni","year":"2004"},{"key":"10.1016\/j.diin.2009.06.011_bib5","unstructured":"Carrier B. Open source digital forensics tools: the legal argument. Technical report, @stake Research Report, Oct 2002."},{"issue":"4","key":"10.1016\/j.diin.2009.06.011_bib6","article-title":"Defining digital forensic examination and analysis tools using abstraction layers","volume":"1","author":"Carrier","year":"2003","journal-title":"Int J Digital Evidence"},{"key":"10.1016\/j.diin.2009.06.011_bib7","series-title":"File system forensic analysis","author":"Carrier","year":"2005"},{"key":"10.1016\/j.diin.2009.06.011_bib8","doi-asserted-by":"crossref","unstructured":"Cohen M., Garfinkel S, Schatz B. Extending the advanced forensic format to accommodate multiple data sources, logical evidence, Arbitrary Information and Forensic Workflow. In: Proc. Annual DFRWS Conference; August 2009.","DOI":"10.1016\/j.diin.2009.06.010"},{"key":"10.1016\/j.diin.2009.06.011_bib9","doi-asserted-by":"crossref","unstructured":"Foster I, V\u00f6ckler J, Wilde M, and Zhao Y. Chimera: A virtual data system for representing, querying, and automating data derivation. In: Proc. Int. Conf. on scientific and statistical database management, July 2002.","DOI":"10.1109\/SSDM.2002.1029704"},{"key":"10.1016\/j.diin.2009.06.011_bib10","doi-asserted-by":"crossref","unstructured":"Foster I, V\u00f6ckler J, Wilde M, Zhao Y. The virtual data grid: a new model and architecture for data-intensive collaboration. In: Proc. Conf. on Innovative Data Systems Research (CIDR); Jan 2003.","DOI":"10.1109\/SSDM.2003.1214945"},{"key":"10.1016\/j.diin.2009.06.011_bib11","doi-asserted-by":"crossref","unstructured":"Garfinkel S. Automating disk forensic processing with SleuthKit, XML and Python. In: IEEE workshop on systematic approaches to digital forensic engineering, May 2009.","DOI":"10.1109\/SADFE.2009.12"},{"key":"10.1016\/j.diin.2009.06.011_bib12","unstructured":"Garfinkel S, Malan D, Dubec K, Stevens C, Pham C. Disk imaging with the advanced forensics format, library and tools. In: Proc. IFIP Intl Conf on Digital Forensics; Jan 2006."},{"issue":"2","key":"10.1016\/j.diin.2009.06.011_bib13","article-title":"Shrinking the ocean: formalizing I\/O methods in modern operating systems","volume":"1","author":"Gerber","year":"2002","journal-title":"Int J Digital Evidence"},{"issue":"13","key":"10.1016\/j.diin.2009.06.011_bib14","article-title":"Gatekeeping out of the box: open source software as a mechanism to assess reliability for digital evidence","volume":"6","author":"Kenneally","year":"2001","journal-title":"Va J Law Tech"},{"issue":"1","key":"10.1016\/j.diin.2009.06.011_bib15","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/TSE.1986.6312924","article-title":"An experimental evaluation of the assumption of independence in multi-version programming","volume":"12","author":"Knight","year":"1986","journal-title":"IEEE Trans Software Eng"},{"key":"10.1016\/j.diin.2009.06.011_bib16","author":"Komvoteas"},{"key":"10.1016\/j.diin.2009.06.011_bib17","doi-asserted-by":"crossref","unstructured":"Osterweil L, Clarke A, Ellison, Podorozhny R, Wise A, Boose E, Hadley J. Experience in using a process language to define scientific workflow and generate dataset provenance. In: Proc. Intl Symp. on Foundations of Software Engineering, 2008. p. 319\u201329.","DOI":"10.1145\/1453101.1453147"},{"key":"10.1016\/j.diin.2009.06.011_bib18","unstructured":"Pan L, Batten L. Reproducibility of digital evidence in forensic investigations. In: Proc. DFRWS, 2005."},{"key":"10.1016\/j.diin.2009.06.011_bib19","unstructured":"Peters L. Change detection in XML trees: a survey. In: third Twente Student Conference on IT; June 2005."},{"issue":"3","key":"10.1016\/j.diin.2009.06.011_bib20","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/1084805.1084812","article-title":"A survey of data provenance in E-Science","volume":"34","author":"Simmhan","year":"2005","journal-title":"ACM SIGMOD Record"},{"key":"10.1016\/j.diin.2009.06.011_bib21","doi-asserted-by":"crossref","unstructured":"Turner P. Unification of evidence from disparate sources (digital evidence bags). In: Proc. DFRWS, 2005.","DOI":"10.1016\/j.diin.2005.07.001"},{"key":"10.1016\/j.diin.2009.06.011_bib22","unstructured":"Wang Y, DeWitt D, Cai J.-Y.. X-Diff: an effective change detection algorithm for XML documents. Intl Conf. on Data Engineering; 2003."},{"issue":"42","key":"10.1016\/j.diin.2009.06.011_bib23","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/0020-0190(92)90136-J","article-title":"On the editing distance between unordered labeled trees","author":"Zhang","year":"1992","journal-title":"Inform Process Lett"}],"container-title":["Digital Investigation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1742287609000395?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1742287609000395?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T02:28:23Z","timestamp":1558492103000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1742287609000395"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9]]},"references-count":23,"alternative-id":["S1742287609000395"],"URL":"https:\/\/doi.org\/10.1016\/j.diin.2009.06.011","relation":{},"ISSN":["1742-2876"],"issn-type":[{"value":"1742-2876","type":"print"}],"subject":[],"published":{"date-parts":[[2009,9]]}}}