{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T06:24:00Z","timestamp":1766298240945,"version":"build-2065373602"},"reference-count":8,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T00:00:00Z","timestamp":1704240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T00:00:00Z","timestamp":1704240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000935","name":"RSF","doi-asserted-by":"publisher","award":["21-71-20078 in SPC RAS"],"award-info":[{"award-number":["21-71-20078 in SPC RAS"]}],"id":[{"id":"10.13039\/100000935","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,1,3]]},"DOI":"10.1109\/comsnets59351.2024.10427215","type":"proceedings-article","created":{"date-parts":[[2024,2,21]],"date-time":"2024-02-21T18:40:00Z","timestamp":1708540800000},"page":"37-42","source":"Crossref","is-referenced-by-count":7,"title":["Cybercrime Investigation Model"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7056-6972","authenticated-orcid":false,"given":"Andrey","family":"Chechulin","sequence":"first","affiliation":[{"name":"St. Petersburg Federal Research Center of the Russian Academy of Science,St. Petersburg,Russia"}]},{"given":"Maxim","family":"Gorda","sequence":"additional","affiliation":[{"name":"St. Petersburg Federal Research Center of the Russian Academy of Science,St. Petersburg,Russia"}]}],"member":"263","reference":[{"volume-title":"Cybersecurity threatscape: Q2","year":"2023","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.4236\/jdaip.2023.112008"},{"issue":"3","key":"ref3","article-title":"Tactics for the production of investigative actions in the investigation of cybercrime","volume":"2","author":"Davronov","year":"2022","journal-title":"Herald pedagogiki. Nauka i Praktyka"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1016\/j.procs.2022.12.008","article-title":"Digital Evidence Management System for Cybercrime Investigation using Proxy Re-Encryption and Blockchain","volume-title":"4th International Conference on Innovative Data Communication Technology and Application","author":"Chougulea","year":"2022"},{"key":"ref5","article-title":"Digital Forensics Tools Used in Cybercrime Investigation -Comparative Analysis","author":"Hamad","year":"2022","journal-title":"Journal of Xian University of Architecture & Technology"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/3600160.3605013"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/anti-cybercrime.2015.7351934"},{"issue":"1","key":"ref8","first-page":"1","article-title":"An extended model of cybercrime investigations","volume":"3","author":"Ciardhu\u00e1in","year":"2004","journal-title":"International Journal of Digital Evidence"}],"event":{"name":"2024 16th International Conference on COMmunication Systems & NETworkS (COMSNETS)","start":{"date-parts":[[2024,1,3]]},"location":"Bengaluru, India","end":{"date-parts":[[2024,1,7]]}},"container-title":["2024 16th International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10426746\/10426785\/10427215.pdf?arnumber=10427215","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T20:27:47Z","timestamp":1710361667000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10427215\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,3]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/comsnets59351.2024.10427215","relation":{},"subject":[],"published":{"date-parts":[[2024,1,3]]}}}