{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:21:32Z","timestamp":1730276492203,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/issa.2015.7335052","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T17:50:11Z","timestamp":1448301011000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Evaluation and analysis of a software prototype for guidance and implementation of a standardized digital forensic investigation process"],"prefix":"10.1109","author":[{"given":"Melissa","family":"Ingels","sequence":"first","affiliation":[]},{"given":"Aleksandar","family":"Valjarevic","sequence":"additional","affiliation":[]},{"given":"Hein S.","family":"Venter","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"An Extended Model of Cybercrime Investigations","volume":"3","year":"2004","journal-title":"International Journal of Digital Evidence"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-374267-4.00002-1"},{"key":"ref12","article-title":"Fundementals of Digital Forensic Evidence","author":"cohen","year":"0","journal-title":"Handbook of Information and Communication Security"},{"key":"ref13","first-page":"17","article-title":"Challenges with automation in Digital Forensic Investigations","author":"james","year":"2013","journal-title":"Computers and Society"},{"year":"0","key":"ref14","article-title":"MySQL - The world's most popular open source database"},{"year":"0","key":"ref15","article-title":"PHP - Hypertext Preprocessor"},{"year":"0","key":"ref16","article-title":"Laravel - The PHP framework for web artisans"},{"year":"0","key":"ref17","article-title":"Sentry Manual - Cartalyst"},{"year":"0","key":"ref18","article-title":"Wkhtmltopdf"},{"year":"0","key":"ref19","article-title":"Qt WebKit | QtWebKit 5.3 | Documentation | Qt Project"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2014.6950488"},{"journal-title":"Prmceedings of Information Security South Africa 2012 Conference","article-title":"Valjarevic and Venter, Harmonized digital forensic investigation process model","year":"2012","key":"ref3"},{"journal-title":"Electronic Crime Scene Investigation-A Guide for First Responders","year":"2001","author":"doj","key":"ref6"},{"key":"ref5","article-title":"An examination of digital forensic models","author":"reith","year":"2002","journal-title":"International Journal of Digital Evidence"},{"article-title":"Incident Response & Computer Forensics","year":"2003","author":"mandia","key":"ref8"},{"key":"ref7","article-title":"Getting Physical with the Digital Investigation Process","volume":"2","year":"2003","journal-title":"International Journal of Digital Evidence"},{"journal-title":"ISO","article-title":"Information technology - Security techniques - Investigation principles and processes","year":"2015","key":"ref2"},{"journal-title":"Dow Pharmaceuticals Inc","year":"1993","author":"merrell","key":"ref1"},{"key":"ref9","article-title":"A Hierarchical, Objectives-Based Framework for the Digital Investigations process","volume":"2","year":"2005","journal-title":"Digital Investigation"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8535.1993.tb00076.x"},{"year":"0","key":"ref22","article-title":"SUMI Background Reading"},{"year":"0","key":"ref21","article-title":"European Commission: CORDIS: Projects and Results: Software Usability Measurement Inventory (SUMI)"},{"year":"0","key":"ref24","article-title":"NitMedia\/wkhtmI2pdf _ GitHub"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/352515.352516"}],"event":{"name":"2015 Information Security for South Africa (ISSA)","start":{"date-parts":[[2015,8,12]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 Information Security for South Africa (ISSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7328027\/7335039\/07335052.pdf?arnumber=7335052","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T00:47:11Z","timestamp":1490402831000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7335052\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/issa.2015.7335052","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}