{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:47Z","timestamp":1750308587536,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,10]],"date-time":"2015-10-10T00:00:00Z","timestamp":1444435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,10]]},"DOI":"10.1145\/2885990.2885993","type":"proceedings-article","created":{"date-parts":[[2016,3,8]],"date-time":"2016-03-08T14:13:39Z","timestamp":1457446419000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Sandboxing"],"prefix":"10.1145","author":[{"given":"Asif","family":"Iqbal","sequence":"first","affiliation":[{"name":"Athena Labs and Zayed University"}]},{"given":"Hanan","family":"Alobaidli","sequence":"additional","affiliation":[{"name":"Athena Labs"}]},{"given":"Mario","family":"Guimaraes","sequence":"additional","affiliation":[{"name":"Kennesaw State University"}]},{"given":"Oliver","family":"Popov","sequence":"additional","affiliation":[{"name":"Stockholm University"}]}],"member":"320","published-online":{"date-parts":[[2015,10,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04155-6_2"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40576-1_34"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-5906-5_791"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.09.007"},{"volume-title":"Retrieved March, 23","year":"2015","author":"Symantec\u2122 Workspace","key":"e_1_3_2_1_5_1"},{"volume-title":"Retrieved March, 23","year":"2015","author":"How Workspace","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","unstructured":"Jordan Sanderson. Symantec Corporation. Methods and systems for activating and deactivating virtualization layers US patent Number US 8612994 B1 (2013)  Jordan Sanderson. Symantec Corporation. Methods and systems for activating and deactivating virtualization layers US patent Number US 8612994 B1 (2013)"},{"key":"e_1_3_2_1_8_1","unstructured":"National Institute of Standards and Technology. General test methodology for computer forensic tools {Retrieved from} http:\/\/www.cftt.nist.gov\/documents.htm; (2001)  National Institute of Standards and Technology. General test methodology for computer forensic tools {Retrieved from} http:\/\/www.cftt.nist.gov\/documents.htm; (2001)"},{"key":"e_1_3_2_1_9_1","first-page":"143 00007","volume-title":"Digital Forensics with Open Source Tools, edited by Cory Altheide and Harlan Carvey","author":"Altheide Cory","year":"2011"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2014.03.011"},{"key":"e_1_3_2_1_11_1","first-page":"766","volume-title":"2011 International Conference for Internet Technology and Secured Transactions (ICITST)","author":"Obaidli Hanan Al","year":"2011"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2528908.2528926"},{"key":"e_1_3_2_1_13_1","unstructured":"What is Docker Docker Retrieved March 29 2015 from: https:\/\/www.docker.com\/whatisdocker\/  What is Docker Docker Retrieved March 29 2015 from: https:\/\/www.docker.com\/whatisdocker\/"}],"event":{"name":"INFOSECCD '15: Information Security Curriculum Development Conference","sponsor":["KSU Kennesaw State University","SIGMIS ACM Special Interest Group on Management Information Systems"],"location":"Kennesaw Georgia","acronym":"INFOSECCD '15"},"container-title":["Proceedings of the 2015 Information Security Curriculum Development Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2885990.2885993","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2885990.2885993","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:05:15Z","timestamp":1750273515000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2885990.2885993"}},"subtitle":["aid in digital forensic research"],"short-title":[],"issued":{"date-parts":[[2015,10,10]]},"references-count":13,"alternative-id":["10.1145\/2885990.2885993","10.1145\/2885990"],"URL":"https:\/\/doi.org\/10.1145\/2885990.2885993","relation":{},"subject":[],"published":{"date-parts":[[2015,10,10]]},"assertion":[{"value":"2015-10-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}