{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:52:53Z","timestamp":1750308773968,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,4,23]],"date-time":"2006-04-23T00:00:00Z","timestamp":1145750400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,4,23]]},"DOI":"10.1145\/1141277.1141346","type":"proceedings-article","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T16:53:01Z","timestamp":1153759981000},"page":"293-300","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Automated recognition of event scenarios for digital forensics"],"prefix":"10.1145","author":[{"given":"Jonathon","family":"Abbott","sequence":"first","affiliation":[{"name":"Queensland University of Technology, Brisbane, Qld, Australia"}]},{"given":"Jim","family":"Bell","sequence":"additional","affiliation":[{"name":"Defence Science and Technology Org., Edinburgh SA, Australia"}]},{"given":"Andrew","family":"Clark","sequence":"additional","affiliation":[{"name":"Queensland University of Technology, Brisbane, Qld, Australia"}]},{"given":"Olivier","family":"De Vel","sequence":"additional","affiliation":[{"name":"Defence Science and Technology Org., Edinburgh SA, Australia"}]},{"given":"George","family":"Mohay","sequence":"additional","affiliation":[{"name":"Queensland University of Technology, Brisbane, Qld, Australia"}]}],"member":"320","published-online":{"date-parts":[[2006,4,23]]},"reference":[{"volume-title":"Proceedings of 1st Australian Computer, Network & Information Forensics Conference Perth","year":"2003","author":"Kevin Chen","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","unstructured":"NetForensics \"NetForensics \" http:\/\/www.netforensics.com\/ 2003.  NetForensics \"NetForensics \" http:\/\/www.netforensics.com\/ 2003."},{"key":"e_1_3_2_1_3_1","unstructured":"GuardedNet \"GuardedNet neuSECURE \" http:\/\/www.guarded.net\/ 2003.  GuardedNet \"GuardedNet neuSECURE \" http:\/\/www.guarded.net\/ 2003."},{"key":"e_1_3_2_1_4_1","unstructured":"e-Security Inc. \"e-Security Management System \" http:\/\/www.esecurityinc.com\/ 2003.  e-Security Inc. \"e-Security Management System \" http:\/\/www.esecurityinc.com\/ 2003."},{"key":"e_1_3_2_1_5_1","unstructured":"GFI Software USA \"LANguard Security Event Log Monitor \" http:\/\/www.gfisoftware.de\/ 2003.  GFI Software USA \"LANguard Security Event Log Monitor \" http:\/\/www.gfisoftware.de\/ 2003."},{"key":"e_1_3_2_1_6_1","unstructured":"Sawmill \"Flowerfire \" www.sawmill.net 2003.  Sawmill \"Flowerfire \" www.sawmill.net 2003."},{"key":"e_1_3_2_1_7_1","unstructured":"TNT Software \"ELM Log Manager \" https:\/\/www.tnttechnology.com\/ 2003.  TNT Software \"ELM Log Manager \" https:\/\/www.tnttechnology.com\/ 2003."},{"key":"e_1_3_2_1_8_1","unstructured":"I3P - Institute for Information Infrastructure Protection \"National Information Infrastructure Protection Research and Development Agenda Initiative Report Information Infrastructure Protection: Survey of Products Tools and Services \" http:\/\/www.thei3p.org 9 Sept 2002.  I3P - Institute for Information Infrastructure Protection \"National Information Infrastructure Protection Research and Development Agenda Initiative Report Information Infrastructure Protection: Survey of Products Tools and Services \" http:\/\/www.thei3p.org 9 Sept 2002."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1176995"},{"key":"e_1_3_2_1_10_1","first-page":"136","volume-title":"Proceedings of 18th National Information Systems Security Conference","author":"Standard Audit Trail Bishop M.","year":"1995"},{"key":"e_1_3_2_1_11_1","unstructured":"CERIAS \"Audit Trails Format Group \" http:\/\/www.cerias.purdue.edu\/about\/history\/coast\/projects\/audit-trails-format.php: Purdue University 2003.  CERIAS \"Audit Trails Format Group \" http:\/\/www.cerias.purdue.edu\/about\/history\/coast\/projects\/audit-trails-format.php: Purdue University 2003."},{"key":"e_1_3_2_1_12_1","unstructured":"CERIAS Audit Trail Reduction Group http:\/\/www.cerias.purdue.edu\/about\/history\/coast\/projects\/audit-trails-reduce.php: Purdue University 2003.  CERIAS Audit Trail Reduction Group http:\/\/www.cerias.purdue.edu\/about\/history\/coast\/projects\/audit-trails-reduce.php: Purdue University 2003."}],"event":{"name":"SAC06: The 2006 ACM Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Dijon France","acronym":"SAC06"},"container-title":["Proceedings of the 2006 ACM symposium on Applied computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1141277.1141346","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1141277.1141346","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:37Z","timestamp":1750278157000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1141277.1141346"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,4,23]]},"references-count":12,"alternative-id":["10.1145\/1141277.1141346","10.1145\/1141277"],"URL":"https:\/\/doi.org\/10.1145\/1141277.1141346","relation":{},"subject":[],"published":{"date-parts":[[2006,4,23]]},"assertion":[{"value":"2006-04-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}