{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:27:54Z","timestamp":1725791274624},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,7]]},"DOI":"10.1109\/icdsp.2009.5201189","type":"proceedings-article","created":{"date-parts":[[2009,8,24]],"date-time":"2009-08-24T15:04:53Z","timestamp":1251126293000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["A new forensic model and its application to the collection, extraction and long term storage of screen content off a memory dump"],"prefix":"10.1109","author":[{"given":"Stefan","family":"Kiltz","sequence":"first","affiliation":[]},{"given":"Tobias","family":"Hoppe","sequence":"additional","affiliation":[]},{"given":"Jana","family":"Dittmann","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Sustaining Heritage Access Through Multivalent Archiving","year":"0","author":"riestra","key":"13"},{"journal-title":"Long Term Preservation of Digital Documents","year":"2003","author":"borghoff","key":"11"},{"key":"12","article-title":"the uvc: a method for preserving digital documents - proof of concept","author":"lorie","year":"2002","journal-title":"Tech Rep LTP report series No 4"},{"key":"3","article-title":"a road map for digital forensics research","author":"palmer","year":"2001","journal-title":"Report From the First Digital Forensics Research Workshop (DFRWS)"},{"journal-title":"Digital Evidence and Computer Crime","year":"2004","author":"casey","key":"2"},{"key":"1","article-title":"a common process model for incident response and digital forensics","author":"freiling","year":"2007","journal-title":"Proceedings of the IMF2007"},{"key":"10","article-title":"sicherung der integritat und authentizitat in digitalen langzeitarchiven","author":"oermann","year":"2008","journal-title":"Proceedings of D-A-CH Security 2008"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59140-991-5.ch048"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1980.1094702"},{"key":"5","article-title":"sicherstellung von geloschtem schadcode anhand von ram-analysen und filecarving mit hilfe eines forensischen datenmodells","author":"kiltz","year":"2009","journal-title":"Tagungsband zum Deutschen IT- Sicherheitskongress"},{"key":"4","article-title":"physical memory forensics","author":"burdach","year":"2006","journal-title":"Black Hat USA"},{"journal-title":"Kriterienkatalog vertrauenswtirdige digitale langzeitarchive","year":"0","author":"dobratz","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/93.959103"}],"event":{"name":"2009 16th International Conference on Digital Signal Processing (DSP)","start":{"date-parts":[[2009,7,5]]},"location":"Santorini, Greece","end":{"date-parts":[[2009,7,7]]}},"container-title":["2009 16th International Conference on Digital Signal Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5176123\/5201043\/05201189.pdf?arnumber=5201189","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T05:32:50Z","timestamp":1489815170000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5201189\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icdsp.2009.5201189","relation":{},"subject":[],"published":{"date-parts":[[2009,7]]}}}