{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:50:00Z","timestamp":1725573000463},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/iscc.2017.8024515","type":"proceedings-article","created":{"date-parts":[[2017,9,4]],"date-time":"2017-09-04T16:26:54Z","timestamp":1504542414000},"page":"117-121","source":"Crossref","is-referenced-by-count":0,"title":["Preliminary considerations on approaching computer forensic"],"prefix":"10.1109","author":[{"given":"Alessandro","family":"Amoroso","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"ACCESSDATA Forensic toolkint ftk","year":"0","key":"ref33"},{"journal-title":"Xplico network forenisc analysis tool","year":"0","author":"costa","key":"ref32"},{"journal-title":"ACCESSDATA Ftk imager version 3 2 0","year":"0","key":"ref31"},{"journal-title":"Open source digital forensics &#x2014; autopsy & the sleuth kit","year":"0","key":"ref30"},{"journal-title":"Digital Forensics for Legal Professionals","year":"2012","author":"daniel","key":"ref37"},{"journal-title":"Digital Forensics Trial Graphics","year":"2017","author":"sammons","key":"ref36"},{"journal-title":"BLACKBAG Blackligth","year":"0","key":"ref35"},{"journal-title":"GUIDANCE Encase forensic","year":"0","key":"ref34"},{"journal-title":"Electronic Crime Scene Investigation A Guide for First Responders Second Edition","year":"2008","key":"ref10"},{"journal-title":"Best Practices For Seizing Electronic Evidence A Pocket Guide for First Responders v3","year":"2006","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WorldCIS.2014.7028169"},{"journal-title":"File System Forensic Analysis","year":"2005","author":"carrier","key":"ref13"},{"journal-title":"Forensic Discovery","year":"2005","author":"farmer","key":"ref14"},{"journal-title":"Incident Response &Computer Forensics","year":"2014","author":"luttgens","key":"ref15"},{"journal-title":"Real Digital Forensics Computer security and incident response","year":"2006","author":"jones","key":"ref16"},{"journal-title":"Guide to ComputerForensics and Investigations Processind digital evidence","year":"2015","author":"nelson","key":"ref17"},{"journal-title":"Digital evidence and computer crime Forensic science computers and the Internet","year":"2011","author":"casey","key":"ref18"},{"journal-title":"Computer Forensics Jump Start","year":"2011","author":"solomon","key":"ref19"},{"journal-title":"Caine computer aided investigative environment - computer forensics live linux distro","year":"0","author":"bassetti","key":"ref28"},{"journal-title":"ser 27037 2012(E) ISO\/IEC","year":"2012","key":"ref4"},{"journal-title":"DEFT Deft zero - digital evidence & forensics toolkit","year":"0","key":"ref27"},{"journal-title":"ser 27035 2011(E) ISO\/IEC","year":"2011","key":"ref3"},{"journal-title":"27042 2015(E) ISO\/IEC","year":"2015","key":"ref6"},{"journal-title":"ARC Prodiscover forensics edition","year":"0","key":"ref29"},{"journal-title":"27041 2015(E) ISO\/IEC","year":"2015","key":"ref5"},{"journal-title":"Good Practice Guide for Computer-Based Electronic Evidence Official release version 4","year":"2003","key":"ref8"},{"journal-title":"27043 2015(E) ISO\/IEC","year":"2015","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1921141.1921143"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-101r1"},{"key":"ref1","article-title":"Notes for a collaboration: On the design of a wiki-type educational video lecture annotation system","author":"ferretti","year":"2017","journal-title":"International Conference on Semantic Computing (ICSC 2017)"},{"journal-title":"Handbook of Digital Forensics and Investigation","year":"2010","author":"casey","key":"ref20"},{"journal-title":"iOS Forensics Analysis","year":"2010","author":"morrissey","key":"ref22"},{"journal-title":"Internet Forensics Use Digital Evidence to Solve Computer Crime","year":"2005","author":"jones","key":"ref21"},{"journal-title":"Virtualization and Forensics A Digital Forensic Investigator's Guide to Virtual Environments","year":"2010","author":"nd gregory kipper","key":"ref24"},{"journal-title":"IPhone and IOS Forensics Investigation Analysis and Mobile Security for Apple IPhone IPad and IOS Devices","year":"2011","author":"hoog","key":"ref23"},{"journal-title":"SANS Investigative forensic toolkit (sift) workstation version 3","year":"0","key":"ref26"},{"journal-title":"Practical Unix & Internet Security","year":"2003","author":"garfinkel","key":"ref25"}],"event":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2017,7,3]]},"location":"Heraklion, Greece","end":{"date-parts":[[2017,7,6]]}},"container-title":["2017 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8016448\/8024490\/08024515.pdf?arnumber=8024515","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,2]],"date-time":"2017-10-02T21:57:53Z","timestamp":1506981473000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8024515\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/iscc.2017.8024515","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}