{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T21:20:01Z","timestamp":1771017601942,"version":"3.50.1"},"reference-count":10,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Digital Forensic Practice"],"published-print":{"date-parts":[[2008,3,17]]},"DOI":"10.1080\/15567280701721905","type":"journal-article","created":{"date-parts":[[2008,3,13]],"date-time":"2008-03-13T00:25:57Z","timestamp":1205367957000},"page":"1-12","source":"Crossref","is-referenced-by-count":3,"title":["Forensic Extraction of EFS-Encrypted Files in Live System Investigation"],"prefix":"10.1080","volume":"2","author":[{"given":"Ewa","family":"Huebner","sequence":"first","affiliation":[]},{"given":"Derek","family":"Bem","sequence":"additional","affiliation":[]}],"member":"301","reference":[{"key":"CIT0003","volume-title":"Real Digital Forensics: Computer Security and Incident Response","author":"Jones K.","year":"2005"},{"key":"CIT0004","volume-title":"Windows Forensic Analysis","author":"Carvey H.","year":"2007"},{"key":"CIT0005","volume-title":"Forensic Science Handbook","volume":"1","author":"Saferstein R.","year":"2001"},{"key":"CIT0006","volume-title":"Microsoft Windows Internals","author":"Russinovich M. E.","year":"2005"},{"key":"CIT0007","volume-title":"Cryptography: Theory and Practice","author":"Stinson D. R.","year":"2006","edition":"3"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2005.04.006"},{"key":"CIT0017","unstructured":"Mandia, K., Prosie, C. and Pepe, M. 2003.Incident Response & Computer Forensics, 2d, Emeryville, Calif.: McGraw-Hill\/Osborne."},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2007.01.001"},{"key":"CIT0022","volume-title":"Windows Administration at the Command Line","author":"Mueller J. P.","year":"2006","edition":"1"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2007.03.002"}],"container-title":["Journal of Digital Forensic Practice"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10256018808623883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,12,14]],"date-time":"2016-12-14T08:46:40Z","timestamp":1481705200000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/15567280701721905"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3,17]]},"references-count":10,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2008,3,17]]}},"alternative-id":["10.1080\/15567280701721905"],"URL":"https:\/\/doi.org\/10.1080\/15567280701721905","relation":{},"ISSN":["1556-7281","1556-7346"],"issn-type":[{"value":"1556-7281","type":"print"},{"value":"1556-7346","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,3,17]]}}}