{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T13:25:33Z","timestamp":1730294733809,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1109\/sadfe.2013.6911550","type":"proceedings-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T16:39:23Z","timestamp":1412095163000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["On the application of digital forensics in different scenarios"],"prefix":"10.1109","author":[{"given":"Jingsha","family":"He","sequence":"first","affiliation":[]},{"given":"Xuejiao","family":"Wan","sequence":"additional","affiliation":[]},{"given":"Gongzheng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Na","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.05.001"},{"journal-title":"IloveI EMarketer 90 Percent of Chinese Internet Users Have Installed Security Software","year":"0","key":"2"},{"key":"10","first-page":"1","article-title":"Summarization on network security technology","volume":"26","author":"shi","year":"2007","journal-title":"Transducer and Microsystem Technologies"},{"journal-title":"Mobile Internet Traffic Average Household Monthly Breakthrough 100M in 2013 Q1","year":"0","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.013012.00028"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2005.02.001"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2011.6009527"},{"key":"4","first-page":"112","article-title":"The growing need for on-scene triage of mobile devices","volume":"6","author":"richard","year":"0","journal-title":"Digital Investigation"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2007.4417898"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21411-0_23"}],"event":{"name":"2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE)","start":{"date-parts":[[2013,11,21]]},"location":"Hong Kong, Hong Kong","end":{"date-parts":[[2013,11,22]]}},"container-title":["2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6902669\/6911532\/06911550.pdf?arnumber=6911550","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T18:36:07Z","timestamp":1490294167000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6911550\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/sadfe.2013.6911550","relation":{},"subject":[],"published":{"date-parts":[[2013,11]]}}}