{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T21:48:29Z","timestamp":1772488109983,"version":"3.50.1"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T00:00:00Z","timestamp":1700438400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T00:00:00Z","timestamp":1700438400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,20]]},"DOI":"10.1109\/techdefense59795.2023.10380890","type":"proceedings-article","created":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T19:32:56Z","timestamp":1704742376000},"page":"417-422","source":"Crossref","is-referenced-by-count":4,"title":["Digital Chain of Custody Operational Framework"],"prefix":"10.1109","author":[{"given":"Gabriel","family":"Pestana","sequence":"first","affiliation":[{"name":"INOV &#x2013; Instituto de Engenharia de Sistemas e Computadores Inova&#x00E7;&#x00E3;o),Lisbon,Portugal"}]},{"given":"Wilson","family":"Antunes","sequence":"additional","affiliation":[{"name":"Instituto Universit&#x00E1;rio Militar,Centro de Investiga&#x00E7;&#x00E3;o da Academia Militar (CINAMIL), Unidade Militar Laboratorial de Defesa Biol&#x00F3;gica e Qu&#x00ED;mica (UMLDBQ),Lisbon,Portugal"}]},{"given":"J\u00falio","family":"Carvalho","sequence":"additional","affiliation":[{"name":"Instituto Universit&#x00E1;rio Militar,Centro de Investiga&#x00E7;&#x00E3;o da Academia Militar (CINAMIL), Unidade Militar Laboratorial de Defesa Biol&#x00F3;gica e Qu&#x00ED;mica (UMLDBQ),Lisbon,Portugal"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.5120\/19971-1856"},{"key":"ref2","first-page":"126","article-title":"Chain of custody and life cycle of digital evidence","volume":"3","author":"Cosic","year":"2012","journal-title":"Comput Technol Appl"},{"issue":"July","key":"ref3","article-title":"A Digital Forensics Investigation Model With Digital Chain of Custody for Confidentiality, Integrity and Authenticity","volume-title":"Conimsconference.Com.Ng","author":"Koleoso"},{"key":"ref4","first-page":"1","article-title":"ISO\/FDIS 22095: 2020 (E) Chain of custody \u2014 General terminology and models","year":"2020","journal-title":"International Organization for Standardization"},{"key":"ref5","first-page":"1","article-title":"EN ISO\/IEC 27037 Information technology-Security techniques-Guidelines for identification, collection, acquisition and preservation of digital evidence","year":"2016","journal-title":"CEN-CENELEC Management Centre"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-04819-7_30"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/healthcare11050634"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2023.103857"},{"key":"ref9","article-title":"ISO\/FDIS 22313 Security and resilience \u2014 Business continuity management systems \u2014 Guidance on the use of ISO 22301","year":"2019","journal-title":"International Organization for Standardization"},{"key":"ref10","first-page":"1","article-title":"EN ISO\/IEC 27042 Information technology-Security techniques-Guidelines for the analysis and interpretation of digital evidence","year":"2016","journal-title":"International Organization for Standardization"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.15394\/jdfsl.2017.1478"},{"key":"ref12","article-title":"Investigating alleged use of biological agents against agriculture, livestock and the natural environment: A practical approach","author":"Gouveia-Carvalho","year":"2019","journal-title":"Portugal, BWC\/MSP\/2019\/WP4"}],"event":{"name":"2023 IEEE International Workshop on Technologies for Defense and Security (TechDefense)","location":"Rome, Italy","start":{"date-parts":[[2023,11,20]]},"end":{"date-parts":[[2023,11,22]]}},"container-title":["2023 IEEE International Workshop on Technologies for Defense and Security (TechDefense)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10380801\/10380807\/10380890.pdf?arnumber=10380890","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,13]],"date-time":"2024-01-13T00:44:09Z","timestamp":1705106649000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10380890\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,20]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/techdefense59795.2023.10380890","relation":{},"subject":[],"published":{"date-parts":[[2023,11,20]]}}}