{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,7,23]],"date-time":"2023-07-23T07:13:54Z","timestamp":1690096434384},"reference-count":11,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Digital Forensic Practice"],"published-print":{"date-parts":[[2008,12,9]]},"DOI":"10.1080\/15567280802552829","type":"journal-article","created":{"date-parts":[[2008,12,12]],"date-time":"2008-12-12T21:39:47Z","timestamp":1229117987000},"page":"117-131","source":"Crossref","is-referenced-by-count":2,"title":["Automated Windows Memory File Extraction for Cyber Forensics Investigation"],"prefix":"10.1080","volume":"2","author":[{"given":"Seyed Mahmood","family":"Hejazi","sequence":"first","affiliation":[]},{"given":"Mourad","family":"Debbabi","sequence":"additional","affiliation":[]},{"given":"Chamseddine","family":"Talhi","sequence":"additional","affiliation":[]}],"member":"301","reference":[{"key":"CIT0001","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/j.diin.2008.02.001","volume":"4","author":"Huebner E.","year":"2007","journal-title":"Digital Investigation Journal"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1145\/1368506.1368510"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2007.06.009"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.06.010"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2008.05.014"},{"key":"CIT0020","volume-title":"Microsoft\u00ae Windows\u00ae Internals","author":"Russinovich M. E.","year":"2004","edition":"4"},{"key":"CIT0025","author":"Carvey H.","year":"2007","journal-title":"Syngress"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1109\/SMCSIA.2003.1232409"},{"key":"CIT0029","volume-title":"Java Persistence with Hibernate","author":"Bauer C.","year":"2006"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.06.015"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.12.002"}],"container-title":["Journal of Digital Forensic Practice"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10256018808623883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T06:56:20Z","timestamp":1557989780000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/15567280802552829"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,12,9]]},"references-count":11,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2008,12,9]]}},"alternative-id":["10.1080\/15567280802552829"],"URL":"https:\/\/doi.org\/10.1080\/15567280802552829","relation":{},"ISSN":["1556-7281","1556-7346"],"issn-type":[{"value":"1556-7281","type":"print"},{"value":"1556-7346","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,12,9]]}}}