{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:20:50Z","timestamp":1725574850944},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/eit.2014.6871826","type":"proceedings-article","created":{"date-parts":[[2014,8,18]],"date-time":"2014-08-18T21:03:43Z","timestamp":1408395823000},"page":"567-572","source":"Crossref","is-referenced-by-count":0,"title":["A novel approach to evaluating similarity in computer forensic investigations"],"prefix":"10.1109","author":[{"given":"Ryan Q.","family":"Hankins","sequence":"first","affiliation":[]},{"given":"Jigang","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.1999.840376"},{"journal-title":"An Introduction to Kolmogorov Complexity and Its Applications","year":"2009","author":"li","key":"13"},{"key":"14","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1145\/332306.332352","article-title":"A compression algorithm for DNA sequences and its applications in genome comparison","author":"chen","year":"2000","journal-title":"Proceedings of the Fourth Annual International Conference on Computational Molecular biology"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/IMF.2013.18"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2013.06.006"},{"journal-title":"A Hypothesis-Based Approach to Digital Forensic Investigations","year":"2006","author":"carrier","key":"3"},{"key":"2","article-title":"An event-based digital forensic investigation framework","author":"carrier","year":"2004","journal-title":"Proceedings of DFRWS 2004"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40802-1_28"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.14257\/astl.2013.28.16"},{"key":"7","first-page":"24","author":"kasprzak","year":"2009","journal-title":"Finding Plagiarism by Evaluating Document Similarities"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46043-8_4"},{"key":"5","first-page":"5964","article-title":"Signature extraction for overlap detection in documents","author":"finkel","year":"2002","journal-title":"Proceedings of the Twenty-fifth Australasian Conference on Computer Science - Volume 4 Ser ACSC '02 Darlinghurst Australia Australia Australian Computer Society Inc"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/792550.792552"},{"key":"9","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1109\/ICICIC.2008.422","article-title":"Plagiarism detection using the levenshtein distance and smithwaterman algorithm","author":"su","year":"2008","journal-title":"Proceedings of the 2008 3rd International Conference on Innovative Computing Information and Control Ser ICICIC '08"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/SEQUEN.1997.666900"}],"event":{"name":"2014 IEEE International Conference on Electro\/Information Technology (EIT)","start":{"date-parts":[[2014,6,5]]},"location":"Milwaukee, WI, USA","end":{"date-parts":[[2014,6,7]]}},"container-title":["IEEE International Conference on Electro\/Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6863137\/6871745\/06871826.pdf?arnumber=6871826","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,15]],"date-time":"2022-04-15T00:08:58Z","timestamp":1649981338000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6871826\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/eit.2014.6871826","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}