{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:20:57Z","timestamp":1759962057497,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,12,27]],"date-time":"2010-12-27T00:00:00Z","timestamp":1293408000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,12,27]]},"DOI":"10.1145\/1963564.1963603","type":"proceedings-article","created":{"date-parts":[[2011,3,29]],"date-time":"2011-03-29T12:02:18Z","timestamp":1301400138000},"page":"226-230","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Evidentiary usage of e-mail forensics"],"prefix":"10.1145","author":[{"given":"Lokendra Kumar","family":"Tiwari","sequence":"first","affiliation":[{"name":"University of Allahabad, Uttar Pradesh, India"}]},{"given":"Shefalika Ghosh","family":"Samaddar","sequence":"additional","affiliation":[{"name":"Motilal Nehru National Institute of Technology, Allahabad, Uttar Pradesh, India"}]},{"given":"Arun Kumar","family":"Singh","sequence":"additional","affiliation":[{"name":"Motilal Nehru National Institute of Technology, Allahabad, Uttar Pradesh, India"}]},{"given":"C. K.","family":"Dwivedi","sequence":"additional","affiliation":[{"name":"University of Allahabad, Uttar Pradesh, India"}]}],"member":"320","published-online":{"date-parts":[[2010,12,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Patricia Alonso Diaz. Computer Forensics","author":"Liu Qian Fredrik Hoglin","year":"2007","unstructured":"Liu Qian , Fredrik Hoglin , Patricia Alonso Diaz. Computer Forensics ; Uppsala University , 2007 Liu Qian, Fredrik Hoglin, Patricia Alonso Diaz. Computer Forensics; Uppsala University, 2007"},{"key":"e_1_3_2_1_2_1","volume-title":"Shefalika. Hard Disk Image Recovery Practices using SSH port forwarding","author":"Mishra","year":"2009","unstructured":"Mishra , Shivani and Ghosh Samaddar , Shefalika. Hard Disk Image Recovery Practices using SSH port forwarding ; Proceeding of the 12th IEEE International Conference on Information Technology ICIT 2009 , Edited by Jargia P. Mohanti, Arindama Singh &amp; Brayendra Panda, Tata McGraw Hill Education Pvt. Ltd . New Delhi ISBN 1397807-068104-2, IEEE Computer Society, Bhubaneswar, India, December 21--24, 2009, page 85--89. Mishra, Shivani and Ghosh Samaddar, Shefalika. Hard Disk Image Recovery Practices using SSH port forwarding; Proceeding of the 12th IEEE International Conference on Information Technology ICIT 2009, Edited by Jargia P. Mohanti, Arindama Singh &amp; Brayendra Panda, Tata McGraw Hill Education Pvt. Ltd. New Delhi ISBN 1397807-068104-2, IEEE Computer Society, Bhubaneswar, India, December 21--24, 2009, page 85--89."},{"volume-title":"C. K. An Examination into Computer Forensic Tools: Proceeding of 1st International Conference on Management of Technology and Information Security ICMIS 2010","author":"Tiwari Lokendra Kumar","key":"e_1_3_2_1_3_1","unstructured":"Tiwari , Lokendra Kumar , Singh , Arun Kumar and Dwivedi , C. K. An Examination into Computer Forensic Tools: Proceeding of 1st International Conference on Management of Technology and Information Security ICMIS 2010 Edited by Anurika Vaish, Pratika Mishra, Abhishek Vaish, Pallavi Dixit and M. D. Tiwari, Shree Publisher and Distributers, New Delhi ISBN 978-81-8329-375-4, IIIT-Allahabad, India, January 21--24, 2010, page 175--183. Tiwari, Lokendra Kumar, Singh, Arun Kumar and Dwivedi, C. K. An Examination into Computer Forensic Tools: Proceeding of 1st International Conference on Management of Technology and Information Security ICMIS 2010 Edited by Anurika Vaish, Pratika Mishra, Abhishek Vaish, Pallavi Dixit and M. D. Tiwari, Shree Publisher and Distributers, New Delhi ISBN 978-81-8329-375-4, IIIT-Allahabad, India, January 21--24, 2010, page 175--183."},{"key":"e_1_3_2_1_4_1","unstructured":"Guidance Software Encase http:\/\/www.digitalintelligence.com\/software\/guidancesoftware\/encase\/ accessed on 15\/7\/2010.  Guidance Software Encase http:\/\/www.digitalintelligence.com\/software\/guidancesoftware\/encase\/ accessed on 15\/7\/2010."},{"key":"e_1_3_2_1_5_1","unstructured":"The BTK site http:\/\/www.freewebs.com\/thebtksite\/ Accessed on 20\/11\/2010  The BTK site http:\/\/www.freewebs.com\/thebtksite\/ Accessed on 20\/11\/2010"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/844102.844104"},{"volume-title":"PACIIA 2009","author":"Meng Wu","key":"e_1_3_2_1_7_1","unstructured":"Meng , Wu , Yang and Yu , \"Research of an E-mail forensic and analysis system based on visualization\" Asia-Pacific Conference on Computational intelligence and Industrial Application, 2009 , PACIIA 2009 Meng, Wu, Yang and Yu, \"Research of an E-mail forensic and analysis system based on visualization\" Asia-Pacific Conference on Computational intelligence and Industrial Application, 2009, PACIIA 2009"},{"key":"e_1_3_2_1_8_1","unstructured":"TITAN Jun-feng HUANG Jian-cai DU Rui-zhong ZHAI Jian-qiang (Institute of Computer Networks Technology Hebei University Baoding 071002 China)  TITAN Jun-feng HUANG Jian-cai DU Rui-zhong ZHAI Jian-qiang (Institute of Computer Networks Technology Hebei University Baoding 071002 China)"},{"key":"e_1_3_2_1_9_1","unstructured":"Disk Imaging in http:\/\/www.cftt.nist.gov\/diskimaging.htm (Accessed on 23 December 2009).  Disk Imaging in http:\/\/www.cftt.nist.gov\/diskimaging.htm (Accessed on 23 December 2009)."},{"key":"e_1_3_2_1_10_1","unstructured":"Linux \"dd\" command in www.redhat.com (Accessed on 17 September 2009).  Linux \"dd\" command in www.redhat.com (Accessed on 17 September 2009)."},{"key":"e_1_3_2_1_11_1","unstructured":"United State Department of Defence www.defence.gov accessed on 15\/7\/2010.  United State Department of Defence www.defence.gov accessed on 15\/7\/2010."},{"key":"e_1_3_2_1_12_1","unstructured":"Metasploit penetration testing resources www.metasploit.com\/research\/projects\/antiforensics accessed on 23\/7\/2010.  Metasploit penetration testing resources www.metasploit.com\/research\/projects\/antiforensics accessed on 23\/7\/2010."}],"event":{"name":"IITM '10: First International Conference on Intelligent Interactive Technologies and Multimedia","acronym":"IITM '10","location":"Allahabad India"},"container-title":["Proceedings of the First International Conference on Intelligent Interactive Technologies and Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1963564.1963603","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1963564.1963603","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:26:46Z","timestamp":1750278406000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1963564.1963603"}},"subtitle":["real life design of a case"],"short-title":[],"issued":{"date-parts":[[2010,12,27]]},"references-count":12,"alternative-id":["10.1145\/1963564.1963603","10.1145\/1963564"],"URL":"https:\/\/doi.org\/10.1145\/1963564.1963603","relation":{},"subject":[],"published":{"date-parts":[[2010,12,27]]},"assertion":[{"value":"2010-12-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}