{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:50:06Z","timestamp":1729659006605,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1109\/sadfe.2013.6911547","type":"proceedings-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T20:39:23Z","timestamp":1412109563000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Quantification of digital forensic hypotheses using probability theory"],"prefix":"10.1109","author":[{"given":"Richard E","family":"Overill","sequence":"first","affiliation":[]},{"given":"Jantje A M","family":"Silomon","sequence":"additional","affiliation":[]},{"given":"Kam-Pui","family":"Chow","sequence":"additional","affiliation":[]},{"given":"Hayson","family":"Tse","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Prevention of Child Pornography Bill","year":"2002","key":"19"},{"journal-title":"Legislative Council Paper CB 2 263 1\/02-03 Report of the Bills Committee on Prevention of Child Pornography Bill","year":"2003","author":"kong","key":"22"},{"key":"17","article-title":"Offender or not offender in technology for facilitating humanity and combating social deviations: Interdisciplinary perspectives","author":"law","year":"2011","journal-title":"IGI Global Information Science Reference"},{"key":"23","first-page":"422","article-title":"Towards argumentation about subjective probabilities","author":"keppens","year":"2012","journal-title":"Proceedings of the Fourth International Conference on Computation Models of Argumentation"},{"key":"18","first-page":"822","author":"abramowitz","year":"0","journal-title":"A Handbook of Mathematical Functions"},{"key":"15","first-page":"9","article-title":"The trojan horse defence in cybercrime cases","volume":"21","author":"brenner","year":"2004","journal-title":"Santa Clara Computer and High Technology Law Journal"},{"key":"16","first-page":"71","article-title":"The rules of time on ntfs file system, proceedings of the second international workshop on systematic approaches to digital forensic engineering (sadfe '07","author":"chow","year":"2007","journal-title":"Washington DC USA IEEE Computer Society"},{"key":"13","first-page":"133","volume":"2","author":"ghavalas","year":"2005","journal-title":"Trojan Defence A Forensic View Part II Digital Investigation"},{"key":"14","first-page":"189","volume":"2","author":"ghavalas","year":"2005","journal-title":"Trusted Computing Forensic Investigations Digital Investigation"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2004.04.005"},{"key":"12","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.diin.2005.01.010","article-title":"Trojan defence: A forensic view","volume":"2","author":"haagman","year":"2005","journal-title":"Digital Investigation"},{"journal-title":"Legislative Council Paper CB(2)S8\/02-03(01) Prevention of Child Pornography Bill","year":"2002","author":"kong","key":"21"},{"key":"3","first-page":"228","author":"overill","year":"0","journal-title":"Sensitivity Analysis of A Bayesian Network for Reasoning about Digital Forensic Evidence 4th International Workshop on Forensics for Future Generation Communication Environments (F2GC-2010"},{"journal-title":"Prevention of Child Pornography Ordinance","year":"2003","key":"20"},{"key":"2","first-page":"9s","author":"kwan","year":"2010","journal-title":"Evaluation of Evidence in Internet Auction Fraud Investigations"},{"key":"1","first-page":"27s","article-title":"Reasoning about evidence using bayesian networks","author":"kwan","year":"2008","journal-title":"Advances in Digital Forensics IV"},{"journal-title":"Quantitative Plausibility of the Trojan Horse Defence Against Possession of Child Pornography","year":"0","author":"overill","key":"10"},{"key":"7","first-page":"671","author":"overill","year":"0","journal-title":"A Complexity Based Model for Quantifying Forensic Evidential Probabilities"},{"key":"6","first-page":"149","author":"overill","year":"2012","journal-title":"Multi-parameter Sensitivity Analysis of A Bayesian Network from A Digital Forensic Investigation Proc 2012 ADFSL Conference on Digital Forensics Security and Law"},{"key":"5","first-page":"65","author":"overill","year":"0","journal-title":"Six simple schemata for approximating bayesian belief networks in cyberforensics Issues and perspectives proc i st international conference on cybercrime security and digital forensics"},{"key":"4","first-page":"213","article-title":"Sensitivity analysis of digital forensic reasoning in bayesian network models","author":"kwan","year":"2011","journal-title":"Advances in Digital Forensics V"},{"key":"9","first-page":"590","author":"overill","year":"0","journal-title":"Uncertainty Bounds for Digital Forensic Evidence AndH Ypotheses"},{"key":"8","first-page":"764","author":"overill","year":"2011","journal-title":"A Complexity Based Forensic Analysis of the TrojanH Orse Defence Proc 4th International Workshop on Digital Forensics (WSDF 2011"}],"event":{"name":"2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE)","start":{"date-parts":[[2013,11,21]]},"location":"Hong Kong, Hong Kong","end":{"date-parts":[[2013,11,22]]}},"container-title":["2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6902669\/6911532\/06911547.pdf?arnumber=6911547","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T21:31:45Z","timestamp":1498167105000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6911547\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/sadfe.2013.6911547","relation":{},"subject":[],"published":{"date-parts":[[2013,11]]}}}