{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T08:50:10Z","timestamp":1725612610611},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/sncc.2014.6866510","type":"proceedings-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T17:18:09Z","timestamp":1406740689000},"page":"1-5","source":"Crossref","is-referenced-by-count":7,"title":["Forensic investigation in Mobile Cloud environment"],"prefix":"10.1109","author":[{"given":"Nouha","family":"Samet","sequence":"first","affiliation":[]},{"given":"Asma","family":"Ben Letaifa","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Hamdi","sequence":"additional","affiliation":[]},{"given":"Sami","family":"Tabbane","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/2498328.2500078"},{"key":"18","article-title":"SecLaaS: Secure logging-as-a-service for cloud forensics","author":"zawoad","year":"2013","journal-title":"Journal CoRR"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ASIAJCIS.2013.21"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSec.2012.6246108"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.592"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1982185.1982226"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2013.07.001"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.05.015"},{"year":"2007","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.1203"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/DICTAP.2012.6215350"},{"key":"10","article-title":"Computer forensics: Incident response essentials book","author":"kurse","year":"2002","journal-title":"Addison Wesley"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2011.440"},{"key":"6","first-page":"248","article-title":"Forensic investigations in Cloud environments","author":"guo","year":"2012","journal-title":"International Conference on Computer Science and Information Processing (CSIP)"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2013.02.004"},{"key":"4","article-title":"Cell phone and GPS forensic tool classification system","author":"brothers","year":"2009","journal-title":"Presentation to Digital Forensics"},{"key":"9","article-title":"Cloud forensics: An Overview","author":"ruan","year":"2011","journal-title":"Advances in Digital Forensics"},{"key":"8","article-title":"Mobile cloud computing: Implications to smartphone forensic procedures and methodologies","author":"meng","year":"2011","journal-title":"Master Thesis Auckland University of Technology"}],"event":{"name":"2014 International Symposium on Networks, Computers and Communications (ISNCC)","start":{"date-parts":[[2014,6,17]]},"location":"Hammamet, Tunisia","end":{"date-parts":[[2014,6,19]]}},"container-title":["The 2014 International Symposium on Networks, Computers and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6861313\/6866503\/06866510.pdf?arnumber=6866510","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T16:26:50Z","timestamp":1490286410000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6866510\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/sncc.2014.6866510","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}