{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T11:48:41Z","timestamp":1763466521702,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/mipro.2015.7160490","type":"proceedings-article","created":{"date-parts":[[2015,7,16]],"date-time":"2015-07-16T18:02:26Z","timestamp":1437069746000},"page":"1382-1386","source":"Crossref","is-referenced-by-count":5,"title":["Challenges in network forensics"],"prefix":"10.1109","author":[{"given":"J.","family":"Buric","sequence":"first","affiliation":[]},{"given":"D.","family":"Delija","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2002.1067738"},{"key":"ref11","first-page":"80","article-title":"Comparative Analysis of Network Forensic Systems","volume":"1","author":"patel","year":"2011","journal-title":"International Journal of Computer Applications"},{"journal-title":"Global Information Assurance Certification Paper","year":"2003","key":"ref12"},{"journal-title":"Network Forensics A survey","year":"2013","author":"chennaka","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPIT.2009.5407485"},{"key":"ref15","article-title":"Detecting Stepping Stones","volume":"9","author":"zhank","year":"2000","journal-title":"9th USENIX Security Symposium"},{"year":"2007","key":"ref16","article-title":"Forensics - Volatile data"},{"key":"ref4","article-title":"A new approach for resolving cyber crime in network forensics based on generic process model","author":"rasmi","year":"2013","journal-title":"the 6th International Conference on Information"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"700","DOI":"10.12720\/jcm.8.11.700-707","article-title":"Honeypots Aiding Network Forensics: Challenges and Notins","volume":"8","author":"al-mousa","year":"2013","journal-title":"Journal of Communication"},{"journal-title":"Report from the First Digital Forensic Research Workshop (DFRWS)","year":"2001","key":"ref6"},{"year":"0","author":"rouse","key":"ref5"},{"key":"ref8","article-title":"Identifiying Significant Features for Network Forensic Analysis Using Artificial Intelligent Techniques","volume":"1","author":"mukkamala","year":"2003","journal-title":"InternationalJournal of Digital Evidence"},{"key":"ref7","article-title":"Network Forensics: Tapping the Internet","author":"garfinkel","year":"2002","journal-title":"O'Reilly Network"},{"key":"ref2","first-page":"74","article-title":"A Survey about Network Forensics Tools","volume":"2","author":"lazzez","year":"2013","journal-title":"International journal of computer science &amp; information Technology"},{"journal-title":"Network Forensics Tracking Hackers through Cyberspace","year":"2012","author":"davidoff","key":"ref1"},{"key":"ref9","article-title":"A Generic Framework for Network Forensics","volume":"1","author":"pilli","year":"2010","journal-title":"Internatioanl Journal of Computer Applications"}],"event":{"name":"2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","start":{"date-parts":[[2015,5,25]]},"location":"Opatija, Croatia","end":{"date-parts":[[2015,5,29]]}},"container-title":["2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7153596\/7160221\/07160490.pdf?arnumber=7160490","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T11:50:43Z","timestamp":1498218643000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7160490\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/mipro.2015.7160490","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}