{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T20:48:16Z","timestamp":1761252496231,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T00:00:00Z","timestamp":1158883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,9,22]]},"DOI":"10.1145\/1231047.1231068","type":"proceedings-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T19:41:00Z","timestamp":1175802060000},"page":"96-101","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Visualization and management of digital forensics data"],"prefix":"10.1145","author":[{"given":"Guillermo","family":"Francia","sequence":"first","affiliation":[{"name":"Jacksonville State University, Jacksonville, AL"}]},{"given":"Monica","family":"Trifas","sequence":"additional","affiliation":[{"name":"Jacksonville State University, Jacksonville, AL"}]},{"given":"Dorothy","family":"Brown","sequence":"additional","affiliation":[{"name":"Jacksonville State University, Jacksonville, AL"}]},{"given":"Rahjima","family":"Francia","sequence":"additional","affiliation":[{"name":"Jacksonville State University, Jacksonville, AL"}]},{"given":"Chrissy","family":"Scott","sequence":"additional","affiliation":[{"name":"Jacksonville State University, Jacksonville, AL"}]}],"member":"320","published-online":{"date-parts":[[2006,9,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume":"3","author":"Barbin Douglas","year":"2002","unstructured":"Barbin , Douglas . \" Computer Forensics Emerges as an Integral Component of an Enterprise Information Assurance Program .\" Information Systems Control Journal , vol. 3 , 2002 . Barbin, Douglas. \"Computer Forensics Emerges as an Integral Component of an Enterprise Information Assurance Program.\" Information Systems Control Journal, vol. 3, 2002.","journal-title":"Information Systems Control Journal"},{"key":"e_1_3_2_1_2_1","unstructured":"Business Wire. \"Strong Demand for Log Data Management Solutions Fuels LogLogic's First Canadian Seminar.\" p.1 2005.  Business Wire. \"Strong Demand for Log Data Management Solutions Fuels LogLogic's First Canadian Seminar.\" p.1 2005."},{"key":"e_1_3_2_1_3_1","volume-title":"Michael Toscano and Isolina SalgadoToner. New Horizons Classroom Learning: Microsoft Project","author":"Caldwell Cindy","year":"2003","unstructured":"Caldwell , Cindy , Jeannie P . Pray , Susan B . SanFilippo , KimPhillips , Angie J. French , Elizabeth Fuller , Frank Wosnick , Michael Toscano and Isolina SalgadoToner. New Horizons Classroom Learning: Microsoft Project . 2003 . Caldwell, Cindy, Jeannie P. Pray, Susan B. SanFilippo, KimPhillips, Angie J. French, Elizabeth Fuller, Frank Wosnick, Michael Toscano and Isolina SalgadoToner. New Horizons Classroom Learning: Microsoft Project. 2003."},{"key":"e_1_3_2_1_4_1","volume-title":"\"Report of the Reporting and Analysis Track.\" Detection of Malicious Code. Intrusions, and Anomalous Activities Workshop.1999","author":"Cohen Michael","year":"2006","unstructured":"Cohen , Michael , L and Jeffery I. Sands . \"Report of the Reporting and Analysis Track.\" Detection of Malicious Code. Intrusions, and Anomalous Activities Workshop.1999 . The National Security Council, The Office of Science &amp; Technology Policy and The Department of Energy . 3 May 2006 . &lt;&lt;http:silkroad.com\/papers\/pdf\/NSC-DOE-OSTP_report_1999.pdf&gt;. Cohen, Michael, L and Jeffery I. Sands. \"Report of the Reporting and Analysis Track.\" Detection of Malicious Code. Intrusions, and Anomalous Activities Workshop.1999. The National Security Council, The Office of Science &amp; Technology Policy and The Department of Energy. 3 May 2006. &lt;&lt;http:silkroad.com\/papers\/pdf\/NSC-DOE-OSTP_report_1999.pdf&gt;."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1113034.1113073"},{"key":"e_1_3_2_1_6_1","unstructured":"Esposito Dino. \"Cryptography the .NET Way.\" http:\/\/www.devx.com\/codemag\/Article\/16747  Esposito Dino. \"Cryptography the .NET Way.\" http:\/\/www.devx.com\/codemag\/Article\/16747"},{"key":"e_1_3_2_1_7_1","volume-title":"A Gentle Introduction","author":"Extreme Programming","year":"2006","unstructured":"Extreme Programming : A Gentle Introduction . 3 May 2006 . &lt;http:\/\/www.extremeprogramining.org\/&gt;. Extreme Programming: A Gentle Introduction. 3 May 2006. &lt;http:\/\/www.extremeprogramining.org\/&gt;."},{"key":"e_1_3_2_1_8_1","volume-title":"et. Al","author":"Fowler M.","year":"2000","unstructured":"Fowler , M. , et. Al ., Refactoring : Improving the Design of Existing Code. Addison-Wesley , 2000 . Fowler, M., et. Al., Refactoring: Improving the Design of Existing Code. Addison-Wesley, 2000."},{"key":"e_1_3_2_1_9_1","volume-title":"Syngress","author":"Giuseppini Gabriele","year":"2004","unstructured":"Giuseppini , Gabriele and Burnett , Mark . Microsoft Log Parser Toolkit . Syngress , Rockland , 2004 . Giuseppini, Gabriele and Burnett, Mark. Microsoft Log Parser Toolkit. Syngress, Rockland, 2004."},{"key":"e_1_3_2_1_10_1","unstructured":"Jacobson V. Leres C. and McCanne S. \"Tcpdump.\" &lt;ftp:\/\/ftp.ee.lbl.gov&gt;. June 1989  Jacobson V. Leres C. and McCanne S. \"Tcpdump.\" &lt;ftp:\/\/ftp.ee.lbl.gov&gt;. June 1989"},{"key":"e_1_3_2_1_11_1","unstructured":"MIT Lincoln Laboratory. \"1998 DARPA Intrusion Detection Evaluation.\" &lt;http:\/\/www.ll.mit.edu\/IST\/ideval.docs\/docs_index.html&gt;  MIT Lincoln Laboratory. \"1998 DARPA Intrusion Detection Evaluation.\" &lt;http:\/\/www.ll.mit.edu\/IST\/ideval.docs\/docs_index.html&gt;"},{"key":"e_1_3_2_1_12_1","volume-title":"NetAPP and Decru Announce End-to-End Secure Log Management Lifecycle Solution","author":"Network Intelligence","year":"2005","unstructured":"\" Network Intelligence , NetAPP and Decru Announce End-to-End Secure Log Management Lifecycle Solution ; Tunkey Solution Manages, Stores , and Secures Sensitive Log data.\" Business Wire , p.1, 2005 . \"Network Intelligence, NetAPP and Decru Announce End-to-End Secure Log Management Lifecycle Solution; Tunkey Solution Manages, Stores, and Secures Sensitive Log data.\" Business Wire, p.1, 2005."},{"key":"e_1_3_2_1_13_1","unstructured":"Purple Insight. 3 May 2006. &lt;http:\/\/www.purpleinsight.com\/products\/index\/shtml&gt;.  Purple Insight. 3 May 2006. &lt;http:\/\/www.purpleinsight.com\/products\/index\/shtml&gt;."},{"key":"e_1_3_2_1_14_1","unstructured":"Sun Microsystems Inc. \"Java Cryptography Extension (JCE) for the Java 2 SDK v. 1.4\" &lt;http:\/\/java.sun.com\/products\/jce\/index-14.html&gt;  Sun Microsystems Inc. \"Java Cryptography Extension (JCE) for the Java 2 SDK v. 1.4\" &lt;http:\/\/java.sun.com\/products\/jce\/index-14.html&gt;"},{"key":"e_1_3_2_1_15_1","volume-title":"Pragmatic Programmers LLC","author":"Thomas Dave","year":"2005","unstructured":"Thomas , Dave and Hansson , David . Agile Web Development with Rails: A Pragmatic Guide . Pragmatic Programmers LLC , Raleigh , 2005 . Thomas, Dave and Hansson, David. Agile Web Development with Rails: A Pragmatic Guide. Pragmatic Programmers LLC, Raleigh, 2005."},{"key":"e_1_3_2_1_16_1","volume-title":"(editors","author":"Thomas J.","year":"2005","unstructured":"Thomas , J. and Cook , K . (editors ). \"Illuminating the Path: the Research and Development Agenda for Visual Analytics.\" IEEE Computer Society Press , 2005 . Thomas, J. and Cook, K. (editors). \"Illuminating the Path: the Research and Development Agenda for Visual Analytics.\" IEEE Computer Society Press, 2005."},{"key":"e_1_3_2_1_17_1","volume-title":"Flash 5 HOT: Hands-On Training","author":"Weil Kymberlee","year":"2002","unstructured":"Weil , Kymberlee and Green , Garo . Flash 5 HOT: Hands-On Training . Peachpit Press , Berkeley , 2002 . Weil, Kymberlee and Green, Garo. Flash 5 HOT: Hands-On Training. Peachpit Press, Berkeley, 2002."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/586459.586460"}],"event":{"name":"InfoSecCD06: 2006 Information Security Curriculum Development Conference","acronym":"InfoSecCD06","location":"Kennesaw Georgia"},"container-title":["Proceedings of the 3rd annual conference on Information security curriculum development"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231068","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1231047.1231068","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:53Z","timestamp":1750258313000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231068"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,9,22]]},"references-count":18,"alternative-id":["10.1145\/1231047.1231068","10.1145\/1231047"],"URL":"https:\/\/doi.org\/10.1145\/1231047.1231068","relation":{},"subject":[],"published":{"date-parts":[[2006,9,22]]},"assertion":[{"value":"2006-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}