{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:51:56Z","timestamp":1729651916705,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1109\/sadfe.2013.6911548","type":"proceedings-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T16:39:23Z","timestamp":1412095163000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["The next generation for the forensic extraction of electronic evidence from mobile telephones"],"prefix":"10.1109","author":[{"given":"Hayson K. S.","family":"Tse","sequence":"first","affiliation":[]},{"given":"K. P.","family":"Chow","sequence":"additional","affiliation":[]},{"given":"Michael Y. K.","family":"Kwan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Guidelines on cell phone forensics-recommendations of the national institute of standards and technology","author":"jansen","year":"2007","journal-title":"National Institute of Standards and Technology"},{"year":"0","journal-title":"Zhonghuarenmingongheguo Gonganjiguan Banli Xingshi Anjian Chengxu Guiding","key":"35"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1016\/j.clsr.2010.11.001"},{"year":"0","journal-title":"Zhonghuarenmingongheguo Zuigaorenminfayuan Guanyu Shiyong Zhonghuarenmingongheguo Xingshi Susongfa de Jieshi","key":"36"},{"year":"2013","journal-title":"Nternational Bank for Reconstruction and Development \/ the World Bank","key":"18"},{"year":"0","journal-title":"Canada Evidence Act R S C 1985 C C-5","key":"33"},{"key":"15","first-page":"322","volume":"6","author":"goel","year":"2012","journal-title":"Smartphone Forensic Investigation Process Model"},{"key":"34","first-page":"1079","author":"losavio","year":"0","journal-title":"Models in Collaborative and Distributed Digital Investigation in the World of Ubiquitous Computing and Communication Systems in Proceedings of the Memory of the World in the Digital Age Digitization and Preservation (UNESCO 2013"},{"key":"16","article-title":"The need for digital evidence standardisation","volume":"4","author":"marthie","year":"2012","journal-title":"International Journal of Digital Crime and Forensics"},{"year":"1923","journal-title":"Frye V United States 293 F 1013 (D C Cir","key":"13"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1016\/j.diin.2010.05.009"},{"year":"0","journal-title":"Zhonghuarenmingongheguo Xingshi Susongfa","key":"37"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1007\/978-3-642-33962-2_9"},{"year":"0","journal-title":"Gongan Jiguan Banli Xingshi Anjian Chengxu Guiding","key":"38"},{"key":"12","first-page":"143","article-title":"Computer forensics laboratory and tools","volume":"20","author":"francia","year":"2005","journal-title":"Journal of Computing Sciences in Colleges"},{"year":"2009","journal-title":"National Research Council of the National Academies","key":"21"},{"key":"20","article-title":"Computational inference for evidential reasonings in support of judicial proof","author":"levitt","year":"2000","journal-title":"Symposium-Artificial Intelligence and Judiciary Proofs"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1016\/j.diin.2011.03.002"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1016\/j.diin.2009.02.003"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1145\/1368506.1368521"},{"key":"25","article-title":"Mobile device analysis","volume":"2","author":"punja","year":"2008","journal-title":"Small Scale Digital Device Forensics Journal"},{"doi-asserted-by":"publisher","key":"26","DOI":"10.4018\/jdcf.2009070105"},{"doi-asserted-by":"publisher","key":"27","DOI":"10.1093\/lpr\/mgr005"},{"year":"2005","author":"soanes","journal-title":"The Oxford Dictionary of English","key":"28"},{"year":"2011","journal-title":"The Law Reform Commission Expert Evidence in Criminal Proceedings in England and Wales","key":"29"},{"year":"0","journal-title":"ISO\/IEC 27041 Guidance on Assuring Suitability and Adequacy of Investigation Method","key":"3"},{"year":"0","journal-title":"Collection And\/or Acquisition and Preservation of Digital Evidence (First Edition","key":"2"},{"year":"1993","journal-title":"Daubert V Merrell Dow Pharmaceuticals Inc 509 U S 579","key":"10"},{"year":"2005","journal-title":"General Requirements for the Competence of Testing and Calibration Laboratories","key":"1"},{"key":"30","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.diin.2010.05.010","article-title":"Live memory forensics of mobile phones","volume":"7","author":"vrizlynn","year":"2010","journal-title":"Digital Investigation"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1016\/j.diin.2011.08.001"},{"year":"2007","journal-title":"Good Practice Guide for Computer-Based Electronic Evidence (Version 4","key":"6"},{"doi-asserted-by":"publisher","key":"32","DOI":"10.5121\/ijcsit.2011.3302"},{"year":"0","journal-title":"ISO\/IEC 27043 Digital Evidence Investigation Principles and Processes","key":"5"},{"year":"2002","author":"wang din shin","journal-title":"Court Probation Action 8 of 1999","key":"31"},{"year":"0","journal-title":"ISO\/IEC 27042 Guidelines for the Analysis and Interpretation of Digital Evidence","key":"4"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.4018\/jdcf.2010070102"},{"year":"2013","journal-title":"China Internet Network Information Center","key":"8"}],"event":{"name":"2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE)","start":{"date-parts":[[2013,11,21]]},"location":"Hong Kong, Hong Kong","end":{"date-parts":[[2013,11,22]]}},"container-title":["2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6902669\/6911532\/06911548.pdf?arnumber=6911548","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T17:31:45Z","timestamp":1498152705000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6911548\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/sadfe.2013.6911548","relation":{},"subject":[],"published":{"date-parts":[[2013,11]]}}}