{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:23:38Z","timestamp":1750307018550,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,3,29]],"date-time":"2012-03-29T00:00:00Z","timestamp":1332979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","award":["FA9550-10-1-0289"],"award-info":[{"award-number":["FA9550-10-1-0289"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,3,29]]},"DOI":"10.1145\/2184512.2184518","type":"proceedings-article","created":{"date-parts":[[2012,4,17]],"date-time":"2012-04-17T12:53:22Z","timestamp":1334667202000},"page":"18-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Evolution of traditional digital forensics in virtualization"],"prefix":"10.1145","author":[{"given":"Juan Carlos Flores","family":"Cruz","sequence":"first","affiliation":[{"name":"Louisiana Tech University, Ruston, LA"}]},{"given":"Travis","family":"Atkison","sequence":"additional","affiliation":[{"name":"Louisiana Tech University, Ruston, LA"}]}],"member":"320","published-online":{"date-parts":[[2012,3,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.143"},{"issue":"2","key":"e_1_3_2_1_2_1","volume":"6","author":"Bem E.","year":"2007","journal-title":"Computer Forensics Analysis in a Virtual Environment, International Journal of Digital Evidence"},{"volume-title":"Proc. of HPCVirt 2007","year":"2007","author":"Gavrilovska A., S.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","first-page":"191","volume-title":"Proc. Network and Distributed Systems Security Symposium","author":"Garfinkel M.","year":"2003"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2008.85"},{"volume-title":"Investigating the Implications of Virtual Machines Introspection for Digital Forensics. International Conference on Availability, Reliability and Security.","year":"2009","author":"Nance K.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICYCS.2008.218"},{"key":"e_1_3_2_1_9_1","first-page":"385","volume-title":"Secure and Flexible Monitoring of Virtual Machines. Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third Annual, vol., no.","author":"Payne B.","year":"2007"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/874075.876409"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.11"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2010.39"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655148.1655150"},{"key":"e_1_3_2_1_14_1","unstructured":"Kruse II W. G. & Heiser J. G. Computer Forensics: Incident Response Essentials (1st ed.): Addison Wesley Professional 2002.   Kruse II W. G. & Heiser J. G. Computer Forensics: Incident Response Essentials (1st ed.): Addison Wesley Professional 2002 ."},{"key":"e_1_3_2_1_15_1","unstructured":"Thomas D. S. and K. Forcht. Legal Methods of using Computer Forensics Techniques for Computer Crime Analysis and Investigation. Issues in Information System 5(2). 2004.  Thomas D. S. and K. Forcht. Legal Methods of using Computer Forensics Techniques for Computer Crime Analysis and Investigation. Issues in Information System 5(2). 2004."},{"key":"e_1_3_2_1_16_1","unstructured":"B. Nelson A. Phillips F. Enfinger C. Steuart Guide to Computer Forensics and Investigations. Canada: Thomson Learning 2004.   B. Nelson A. Phillips F. Enfinger C. Steuart Guide to Computer Forensics and Investigations. Canada: Thomson Learning 2004 ."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095820"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87403-4_3"},{"key":"e_1_3_2_1_19_1","unstructured":"A. Walters. The Volatility framework: Volatile memory artifact extraction utility framework. https:\/\/www.volatilesystems.com\/default\/volatility.  A. Walters. The Volatility framework: Volatile memory artifact extraction utility framework. https:\/\/www.volatilesystems.com\/default\/volatility."},{"volume-title":"USENIX Annual Technical Conference (USENIX ATC)","year":"2005","author":"Bellard QEMU","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","unstructured":"Sandia National Laboratories. LibVMI. http:\/\/vmitools.sandia.gov\/libvmi.html  Sandia National Laboratories. LibVMI. http:\/\/vmitools.sandia.gov\/libvmi.html"}],"event":{"name":"ACM SE '12: ACM Southeast Regional Conference","sponsor":["ACM Association for Computing Machinery"],"location":"Tuscaloosa Alabama","acronym":"ACM SE '12"},"container-title":["Proceedings of the 50th Annual Southeast Regional Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2184512.2184518","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2184512.2184518","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:49:11Z","timestamp":1750236551000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2184512.2184518"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3,29]]},"references-count":20,"alternative-id":["10.1145\/2184512.2184518","10.1145\/2184512"],"URL":"https:\/\/doi.org\/10.1145\/2184512.2184518","relation":{},"subject":[],"published":{"date-parts":[[2012,3,29]]},"assertion":[{"value":"2012-03-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}