{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T06:47:25Z","timestamp":1725691645811},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/saci.2015.7208257","type":"proceedings-article","created":{"date-parts":[[2015,8,20]],"date-time":"2015-08-20T21:52:02Z","timestamp":1440107522000},"page":"505-510","source":"Crossref","is-referenced-by-count":6,"title":["Cloud computing digital forensics framework for automated anomalies detection"],"prefix":"10.1109","author":[{"given":"Alecsandru","family":"Patrascu","sequence":"first","affiliation":[]},{"given":"Marius-Alexandru","family":"Velciu","sequence":"additional","affiliation":[]},{"given":"Victor Valeriu","family":"Patriciu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"ReC2S: Reliable Cloud Computing System","author":"p?trascu","year":"2012","journal-title":"European Concurrent Engineering Conference"},{"key":"ref11","article-title":"Enhanced diff for high performance forensic enabled cloud infrastructures","author":"p?tra?cu","year":"2014","journal-title":"13th International Conference on Informatics in Economy"},{"year":"0","key":"ref12"},{"year":"0","key":"ref13"},{"year":"0","key":"ref14"},{"year":"0","key":"ref15"},{"year":"0","key":"ref16"},{"year":"0","key":"ref17"},{"key":"ref18","article-title":"Gambit: Software Tools for Game Theory","author":"mckelvey","year":"2014","journal-title":"HFSS Version 14 0 1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1854099.1854121"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICNIDC.2012.6418812"},{"year":"0","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2390317.2390329"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1145\/2484313.2484342","article-title":"SecLaaS: Secure Logging-as-a-Service for Cloud Forensics","author":"zawoad","year":"2013","journal-title":"8th ACM Symposium on Information Computer and Communications Security (ASIACCS)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICComm.2014.6866760"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866850"},{"year":"0","key":"ref1","article-title":"Guide to Integrating Forensic Techniques into Incident Response"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICComm.2014.6866707"}],"event":{"name":"2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics (SACI)","start":{"date-parts":[[2015,5,21]]},"location":"Timisoara, Romania","end":{"date-parts":[[2015,5,23]]}},"container-title":["2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7165000\/7208165\/07208257.pdf?arnumber=7208257","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,13]],"date-time":"2023-08-13T09:02:17Z","timestamp":1691917337000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7208257\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/saci.2015.7208257","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}