{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:42:12Z","timestamp":1729618932262,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/hpcsim.2015.7237027","type":"proceedings-article","created":{"date-parts":[[2015,9,3]],"date-time":"2015-09-03T21:45:56Z","timestamp":1441316756000},"page":"98-105","source":"Crossref","is-referenced-by-count":5,"title":["Using network data to improve digital investigation in cloud computing environments"],"prefix":"10.1109","author":[{"given":"Daniel","family":"Spiekermann","sequence":"first","affiliation":[]},{"given":"Tobias","family":"Eggendorfer","sequence":"additional","affiliation":[]},{"given":"Jorg","family":"Keller","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"110","article-title":"Digital forensics for eucalyptus","author":"anwar","year":"2011","journal-title":"Frontiers of Information Technology IEEE Computer Society"},{"key":"ref11","article-title":"Cloud storage forensic analysis","author":"quick","year":"2012","journal-title":"Flinders University of South Australia"},{"key":"ref12","first-page":"1","article-title":"Challenges in network application identification","volume":"12","author":"tongaonkar","year":"2012","journal-title":"Proceedings of the 5th USENIX Conference on Large-Scale Exploits and Emergent Threats ser LEET"},{"year":"2011","key":"ref13","article-title":"IPS-signatures: Dropbox file sharing client"},{"year":"2012","key":"ref14","article-title":"IPS-signatures: Apple icloud traffic"},{"year":"2015","key":"ref15","article-title":"List of applications excluded from ssl decryption"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SADFE.2007.3"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2013.06.010"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1980.1094702"},{"journal-title":"TCP\/IP Illustrated","year":"1994","author":"stevens","key":"ref19"},{"key":"ref4","first-page":"22","article-title":"Cloud forensic maturity model","volume":"114","author":"ruan","year":"2012","journal-title":"International Conference on Digital Forensics & Cyber Crime ser Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(11)70024-1"},{"key":"ref6","article-title":"Cloud forensics: A meta-study of challenges, approaches, and open problems","volume":"abs 1302 6312","author":"zawoad","year":"2013","journal-title":"Computing Research Repository"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2095536.2095539"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.4018\/jdcf.2012040103"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866850"},{"key":"ref2","first-page":"7","article-title":"The nist definition of cloud computing","volume":"800 145","author":"mell","year":"2011","journal-title":"National Institute of Standards and Technology"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-20917-8","author":"baun","year":"2011","journal-title":"Cloud Computing-Web-Based Dynamic IT Services"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398827"},{"journal-title":"TCP\/IP Network Administration","year":"1994","author":"hunt","key":"ref20"},{"article-title":"About wireshark","year":"2015","author":"combs","key":"ref22"},{"journal-title":"DNS and Bind","year":"1998","author":"liu","key":"ref21"},{"article-title":"Challenging security requirements for us government cloud computing adoption","year":"2012","author":"iorga","key":"ref23"}],"event":{"name":"2015 International Conference on High Performance Computing & Simulation (HPCS)","start":{"date-parts":[[2015,7,20]]},"location":"Amsterdam, Netherlands","end":{"date-parts":[[2015,7,24]]}},"container-title":["2015 International Conference on High Performance Computing &amp; Simulation (HPCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7214433\/7237005\/07237027.pdf?arnumber=7237027","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,13]],"date-time":"2023-08-13T18:40:12Z","timestamp":1691952012000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7237027\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/hpcsim.2015.7237027","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}