{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:11:12Z","timestamp":1730200272478,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,15]],"date-time":"2023-12-15T00:00:00Z","timestamp":1702598400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,15]],"date-time":"2023-12-15T00:00:00Z","timestamp":1702598400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,15]]},"DOI":"10.1109\/bigdata59044.2023.10386481","type":"proceedings-article","created":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T18:28:47Z","timestamp":1705948127000},"page":"5539-5548","source":"Crossref","is-referenced-by-count":0,"title":["Ethical Hacking in Digital Forensics"],"prefix":"10.1109","author":[{"given":"Damilola","family":"Oladimeji","sequence":"first","affiliation":[{"name":"Sam Houston State University,Dept. of Computer Science,Huntsville,Texas"}]},{"given":"Laura","family":"Garland","sequence":"additional","affiliation":[{"name":"Sam Houston State University,Dept. of Computer Science,Huntsville,Texas"}]},{"given":"Jayanthi","family":"Ramamoorthy","sequence":"additional","affiliation":[{"name":"Sam Houston State University,Dept. of Computer Science,Huntsville,Texas"}]},{"given":"Bing","family":"Zhou","sequence":"additional","affiliation":[{"name":"Sam Houston State University,Dept. of Computer Science,Huntsville,Texas"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.14296\/deeslr.v4i0.1798"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.15394\/jdfsl.2015.1201"},{"volume-title":"Development of a professional code of ethics in digital forensics","year":"2017","author":"Seigfried-Spellar","key":"ref3"},{"issue":"4","key":"ref4","first-page":"129","article-title":"Some ethical hacking possibilities in kali linux environment","volume":"9","author":"Cisar","year":"2019","journal-title":"Journal of Applied Technical and Educational Sciences"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.29297\/orbit.v2i1.77"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0361-0_16"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-6539-2.ch070"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/BigData55660.2022.10020328"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMC53470.2022.9753849"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT51715.2021.9509647"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2018.07.02"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2020.301075"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1108\/JIC-05-2019-0097"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICPCSI.2017.8392304"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6627264"},{"volume-title":"Differences between ethical hacking and cybersecurity","key":"ref16"},{"volume-title":"Explore the 5 phases of ethical hacking: Webinar wrap-up","year":"2023","author":"Arora","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3154059"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.04.011"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8053"}],"event":{"name":"2023 IEEE International Conference on Big Data (BigData)","start":{"date-parts":[[2023,12,15]]},"location":"Sorrento, Italy","end":{"date-parts":[[2023,12,18]]}},"container-title":["2023 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10385234\/10386078\/10386481.pdf?arnumber=10386481","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T02:50:05Z","timestamp":1706755805000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10386481\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,15]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/bigdata59044.2023.10386481","relation":{},"subject":[],"published":{"date-parts":[[2023,12,15]]}}}