{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T19:03:27Z","timestamp":1757703807126},"reference-count":15,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Digital Forensic Practice"],"published-print":{"date-parts":[[2009,9,9]]},"DOI":"10.1080\/15567280903140953","type":"journal-article","created":{"date-parts":[[2009,9,14]],"date-time":"2009-09-14T12:05:21Z","timestamp":1252929921000},"page":"196-208","source":"Crossref","is-referenced-by-count":4,"title":["Consideration of Issues for Parallel Digital Forensics of RAID Systems"],"prefix":"10.1080","volume":"2","author":[{"given":"Vincent","family":"Urias","sequence":"first","affiliation":[]},{"given":"Curtis","family":"Hash","sequence":"additional","affiliation":[]},{"given":"Lorie M.","family":"Liebrock","sequence":"additional","affiliation":[]}],"member":"301","reference":[{"key":"CIT0002","unstructured":"Roussev, V. and Richard, G.G. III. Breaking the Performance Wall: The Case of Distributed Digital Forensics. Paper presented at the Digital Forensics Research Workshop. August11\u2013132004, Linthicum, Md."},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1145\/1113034.1113074"},{"key":"CIT0004","volume-title":"Advances in Digital Forensics","author":"Beebe N.L.","year":"2006"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2007.06.014"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2008.05.006"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.01.007"},{"key":"CIT0008","first-page":"1","volume":"1","author":"Carrier B.","year":"2003","journal-title":"International Journal of Digital Evidence"},{"key":"CIT0009","volume-title":"Cyber Crime Investigations: Bridging the Gaps between Security Professionals, Law Enforcement, and Prosecutors","author":"Reyes A.","year":"2007"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8191(02)00091-1"},{"key":"CIT0013","volume-title":"Advanced Computer Architecture and Parallel Processing","author":"El-Rewini H.","year":"2005"},{"key":"CIT0014","volume-title":"Computer Evidence: Collection and Preservation","author":"Brown C.L.T.","year":"2005"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1080\/15567280801958464"},{"key":"CIT0016","volume-title":"Advances in Digital Forensics III","author":"Beebe N.","year":"2007"},{"key":"CIT0017","first-page":"30","author":"Goscha C.M.","year":"2007","journal-title":"The Journal of Public Inquiry"},{"key":"CIT0018","volume-title":"Advances in Digital Forensics IV","author":"Riley J.","year":"2008"}],"container-title":["Journal of Digital Forensic Practice"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10256018808623883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,12,14]],"date-time":"2016-12-14T13:46:48Z","timestamp":1481723208000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/15567280903140953"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9,9]]},"references-count":15,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2009,9,9]]}},"alternative-id":["10.1080\/15567280903140953"],"URL":"https:\/\/doi.org\/10.1080\/15567280903140953","relation":{},"ISSN":["1556-7281","1556-7346"],"issn-type":[{"value":"1556-7281","type":"print"},{"value":"1556-7346","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,9,9]]}}}