{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:21:36Z","timestamp":1730276496179,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/issa.2015.7335077","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T22:50:11Z","timestamp":1448319011000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Towards a digital forensic science"],"prefix":"10.1109","author":[{"given":"Martin S","family":"Olivier","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24123-4_2"},{"key":"ref11","article-title":"On complex crimes and digital forensics","volume":"63","author":"olivier","year":"2013","journal-title":"Hasso-Plattner-Instituts fur Softwaresystemtechnik an der Universit&#x00E4;t Potsdam Technishe Berichte"},{"journal-title":"Case Study Research Design and Methods","year":"2013","author":"yin","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24123-4_3"},{"journal-title":"Digital Evidence and Computer Crime","year":"2004","author":"casey","key":"ref14"},{"journal-title":"Defining Moments","year":"2011","author":"barnard","key":"ref15"},{"journal-title":"Every Second Counts The Race to Transplant the First Human Heart","year":"2006","author":"mcrae","key":"ref16"},{"article-title":"It's not about the evidence &#x2026; narrative forensic hypotheses in the age of social media in Advances in Digital Forensics","year":"2015","author":"pollitt","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1201\/9781420036930"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S0379-0738(02)00031-2"},{"journal-title":"Byleveld dossier of a serial sleuth","year":"2011","author":"retief","key":"ref4"},{"journal-title":"The Sign of Four","year":"1890","author":"doyle","key":"ref3"},{"journal-title":"Forensic Fraud Evaluating Law Enforcement and Forensic Science Cultures in the Context of Examiner Misconduct","year":"2013","author":"turvey","key":"ref6"},{"journal-title":"Committee on Identifying the Needs of the Forensic Science Community Committee on Science Technology and Law Policy and Global Affairs and Committee on Applied and Theoretical Statistics Division on Engineering and Physical Sciences","article-title":"Strengthening forensic science in the united states: A path forward","year":"2009","key":"ref5"},{"journal-title":"Digital Forensic Evidence Examination","year":"2012","author":"cohen","key":"ref8"},{"article-title":"Formalising event reconstruction in digital investigations","year":"2004","author":"gladyshev","key":"ref7"},{"journal-title":"Investigative Psychology Offender Profiling and the Analysis of Criminal Action","year":"2009","author":"canter","key":"ref2"},{"journal-title":"Scientific Working Group on Digital Evidence Tech Rep","article-title":"Digital forensics as a forensic science discipline, version: 1.0","year":"2014","key":"ref1"},{"journal-title":"A Hypothesis-Based Approach to Digital Forensic Investigations","year":"2006","author":"carrier","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-84927-0_16"}],"event":{"name":"2015 Information Security for South Africa (ISSA)","start":{"date-parts":[[2015,8,12]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 Information Security for South Africa (ISSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7328027\/7335039\/07335077.pdf?arnumber=7335077","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T04:41:52Z","timestamp":1490416912000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7335077\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/issa.2015.7335077","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}