{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T08:10:20Z","timestamp":1648800620891},"reference-count":7,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Digital Forensic Practice"],"published-print":{"date-parts":[[2009,9,9]]},"DOI":"10.1080\/15567280903140938","type":"journal-article","created":{"date-parts":[[2009,9,14]],"date-time":"2009-09-14T08:05:21Z","timestamp":1252915521000},"page":"175-182","source":"Crossref","is-referenced-by-count":6,"title":["Software Piracy Forensics: Exploiting Nonautomated and Judiciary-Friendly Techniques"],"prefix":"10.1080","volume":"2","author":[{"given":"S. Santhosh","family":"Baboo","sequence":"first","affiliation":[]},{"given":"P. Vinod","family":"Bhattathiripad","sequence":"additional","affiliation":[]}],"member":"301","reference":[{"key":"CIT0001","volume":"1","author":"Thomas J.","year":"1990","journal-title":"Computer Underground Digest"},{"key":"CIT0002","volume-title":"Comparative Discourse Analysis of Parallel Texts","author":"van der Ejik P.","year":"1994"},{"key":"CIT0004","first-page":"1","volume":"6","author":"Frantzeskou G.","year":"2007","journal-title":"International Journal of Digital Evidence"},{"key":"CIT0005","author":"Yamamoto T.","year":"2004","journal-title":"IEEE Transactions on Software Engineering"},{"key":"CIT0008","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1080\/01972240802189468","volume":"24","author":"Holsapple C.W.","year":"2008","journal-title":"The Information Society"},{"key":"CIT0009","unstructured":"Loubach, D.S., Ramos, D.B., Saotome, O. and da Cunha, A.M. Comparing Source Codes Generated by CASE Tools with Hand Coded. Paper presented at the Fifth International Conference on Information Technology: New Generations, IEEE Computer Society. April7\u20139. Las Vegas, NV"},{"key":"CIT0012","volume-title":"Cyber Forensics","author":"Marcella A.J.","year":"2008"}],"container-title":["Journal of Digital Forensic Practice"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10256018808623883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T19:41:30Z","timestamp":1497814890000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/15567280903140938"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9,9]]},"references-count":7,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2009,9,9]]}},"alternative-id":["10.1080\/15567280903140938"],"URL":"https:\/\/doi.org\/10.1080\/15567280903140938","relation":{},"ISSN":["1556-7281","1556-7346"],"issn-type":[{"value":"1556-7281","type":"print"},{"value":"1556-7346","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,9,9]]}}}