{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T08:57:17Z","timestamp":1725526637501},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/mipro.2015.7160491","type":"proceedings-article","created":{"date-parts":[[2015,7,16]],"date-time":"2015-07-16T18:02:26Z","timestamp":1437069746000},"page":"1387-1392","source":"Crossref","is-referenced-by-count":0,"title":["An approach to digital evidence collection for successful forensic application: An investigation of blackmail case"],"prefix":"10.1109","author":[{"given":"Kemal","family":"Hajdarevic","sequence":"first","affiliation":[]},{"given":"Vahidin","family":"Dzaltur","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Anatomy of an arp poisoning attack","year":"0","author":"nachreiner","key":"ref10"},{"key":"ref11","article-title":"Wireless hacking - a WiFi hack by cracking WEP","author":"reddy","year":"2010","journal-title":"2nd International Conference on Education Technology and Computer (ICRTC)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCICCT.2014.6992942"},{"journal-title":"DIGITAL FORENSIC INVESTIGATION COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE","year":"2014","author":"dzaltur","key":"ref13"},{"year":"0","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CICT.2013.6558135"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2013.6645525"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2012.6339146"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2010.120"},{"journal-title":"Refresher Series - Capturing and cracking SMB hashes with Cain and Half-LM rainbow tables","year":"0","key":"ref19"},{"journal-title":"Angry IP Scanner","year":"0","key":"ref4"},{"journal-title":"The Tao of Network Security Monitoring","year":"2004","author":"bejtlich","key":"ref3"},{"year":"0","key":"ref6"},{"year":"0","key":"ref5"},{"year":"0","key":"ref8"},{"year":"0","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CYCON.2014.6916396"},{"journal-title":"Handbook of Digital Forensics and Investigation","year":"2005","author":"casey","key":"ref1"},{"journal-title":"Configuring Cain to Sniff Passwords on Wireless LAN Adapter","year":"0","key":"ref9"},{"year":"0","key":"ref20"}],"event":{"name":"2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","start":{"date-parts":[[2015,5,25]]},"location":"Opatija, Croatia","end":{"date-parts":[[2015,5,29]]}},"container-title":["2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7153596\/7160221\/07160491.pdf?arnumber=7160491","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T16:18:45Z","timestamp":1490372325000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7160491\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/mipro.2015.7160491","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}