{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:40:02Z","timestamp":1750196402521,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T00:00:00Z","timestamp":1598313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["CNS-1726069"],"award-info":[{"award-number":["CNS-1726069"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,8,25]]},"DOI":"10.1145\/3407023.3407056","type":"proceedings-article","created":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T16:32:52Z","timestamp":1596126772000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["DFS\n            <sup>3<\/sup>"],"prefix":"10.1145","author":[{"given":"Edward","family":"Harshany","sequence":"first","affiliation":[{"name":"University of South Alabama"}]},{"given":"Ryan","family":"Benton","sequence":"additional","affiliation":[{"name":"University of South Alabama"}]},{"given":"David","family":"Bourrie","sequence":"additional","affiliation":[{"name":"University of South Alabama"}]},{"given":"Michael","family":"Black","sequence":"additional","affiliation":[{"name":"University of South Alabama"}]},{"given":"William","family":"Glisson","sequence":"additional","affiliation":[{"name":"Sam Houston State University"}]}],"member":"320","published-online":{"date-parts":[[2020,8,25]]},"reference":[{"issue":"4","key":"e_1_3_2_1_1_1","first-page":"1","article-title":"Defining Digital Forensic Examination and Analysis Tool Using Abstraction Layers","volume":"1","year":"2003","unstructured":"\" Defining Digital Forensic Examination and Analysis Tool Using Abstraction Layers .,\" Int. J. Digit. Evid. , vol. 1 , no. 4 , pp. 1 -- 12 , 2003 . \"Defining Digital Forensic Examination and Analysis Tool Using Abstraction Layers.,\" Int. J. Digit. Evid., vol. 1, no. 4, pp. 1--12, 2003.","journal-title":"Int. J. Digit. Evid."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-101r1"},{"key":"e_1_3_2_1_3_1","unstructured":"[ISO\/IEC 27037:2012]. 1st ed \"Guidelines for identification collection acquisition and preservation of digital evidence \" 2012. http:\/\/www.iso27001security.com\/html\/27037.html (accessed Mar. 13 2018).  [ISO\/IEC 27037:2012]. 1st ed \"Guidelines for identification collection acquisition and preservation of digital evidence \" 2012. http:\/\/www.iso27001security.com\/html\/27037.html (accessed Mar. 13 2018)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"C. Kynogis W. B. Glisson T. R. Andel and J. T. McDonald \"Utilizing the Cloud to Store Camera-Hijacked Images \" in Hawaii International Conference on System Sciences 2016 vol. HICSS-49.  C. Kynogis W. B. Glisson T. R. Andel and J. T. McDonald \"Utilizing the Cloud to Store Camera-Hijacked Images \" in Hawaii International Conference on System Sciences 2016 vol. HICSS-49.","DOI":"10.1109\/HICSS.2016.679"},{"issue":"2","key":"e_1_3_2_1_5_1","first-page":"4","article-title":"Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps","volume":"8","author":"Grispos G.","year":"2015","unstructured":"G. Grispos , W. B. Glisson , J. H. Pardue , and M. Dickson , \" Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps ,\" J. Inf. Syst. Appl. Res. , vol. 8 , no. 2 , pp. 4 -- 14 , 2015 , [Online]. Available: http:\/\/jisar.org\/2015-8\/. G. Grispos, W. B. Glisson, J. H. Pardue, and M. Dickson, \"Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps,\" J. Inf. Syst. Appl. Res., vol. 8, no. 2, pp. 4--14, 2015, [Online]. Available: http:\/\/jisar.org\/2015-8\/.","journal-title":"J. Inf. Syst. Appl. Res."},{"key":"e_1_3_2_1_6_1","volume-title":"Insight from a Docker Container Introspection,\" in Proceedings of the 52nd Hawaii International Conference on System Sciences","author":"Watts T.","year":"2019","unstructured":"T. Watts , R. Benton , W. Glisson , and J. Shropshire , \" Insight from a Docker Container Introspection,\" in Proceedings of the 52nd Hawaii International Conference on System Sciences , 2019 . T. Watts, R. Benton, W. Glisson, and J. Shropshire, \"Insight from a Docker Container Introspection,\" in Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019."},{"key":"e_1_3_2_1_7_1","volume-title":"Container and VM Visualization for Rapid Forensic Analysis,\" in Proceedings of the 53rd Hawaii International Conference on System Sciences","author":"Shropshire J.","year":"2020","unstructured":"J. Shropshire and R. Benton , \" Container and VM Visualization for Rapid Forensic Analysis,\" in Proceedings of the 53rd Hawaii International Conference on System Sciences , 2020 . J. Shropshire and R. Benton, \"Container and VM Visualization for Rapid Forensic Analysis,\" in Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.4018\/jdcf.2012040103"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2018.05.031"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-016-0553-1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-016-0791-8"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.5"},{"key":"e_1_3_2_1_13_1","first-page":"347","volume-title":"R. K.-K. R.","author":"Grispos G.","year":"2015","unstructured":"G. Grispos , W. B. Glisson , and T. Storer , \" Chapter 16 - Recovering residual forensic data from smartphone interactions with cloud storage providers,\" in The Cloud Security Ecosystem , R. K.-K. R. , Boston : Syngress , 2015 , pp. 347 -- 382 . G. Grispos, W. B. Glisson, and T. Storer, \"Chapter 16 - Recovering residual forensic data from smartphone interactions with cloud storage providers,\" in The Cloud Security Ecosystem, R. K.-K. R., Boston: Syngress, 2015, pp. 347--382."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.592"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2020.300909"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.06.011"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/b978-012369388-4\/50059-x"},{"issue":"10","key":"e_1_3_2_1_18_1","first-page":"2958","article-title":"An Overview of Distributed File System","volume":"2","author":"Khazanchi K.","year":"2013","unstructured":"K. Khazanchi , A. Kanwar , and L. Saluja , \" An Overview of Distributed File System ,\" Ijmer , vol. 2 , no. 10 , pp. 2958 -- 2965 , 2013 . K. Khazanchi, A. Kanwar, and L. Saluja, \"An Overview of Distributed File System,\" Ijmer, vol. 2, no. 10, pp. 2958--2965, 2013.","journal-title":"Ijmer"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"H. G. Sanjay Ghemawat and Shun-Tak Leung \"The google filesystem \" 2003.  H. G. Sanjay Ghemawat and Shun-Tak Leung \"The google filesystem \" 2003.","DOI":"10.1145\/945445.945450"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.2307\/624306"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1051914"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1667053.1667059"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1520\/jfs2004127"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2014.06.008"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.05.006"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.07.006"},{"key":"e_1_3_2_1_27_1","first-page":"1","volume-title":"November","author":"Chen K.","year":"2003","unstructured":"K. Chen , A. Clark , O. De Vel , G. Mohay , and Q. Brisbane , \" Ecf - Event Correlation for Forensics Introduction: Ecf System Requirements and Design,\" Network, no . November , pp. 1 -- 10 , 2003 , [Online]. Available : http:\/\/scissec.scis.ecu.edu.au\/secauconfs\/proceedings\/2003\/forensics\/pdf\/11_final.pdf. K. Chen, A. Clark, O. De Vel, G. Mohay, and Q. Brisbane, \"Ecf - Event Correlation for Forensics Introduction: Ecf System Requirements and Design,\" Network, no. November, pp. 1--10, 2003, [Online]. Available: http:\/\/scissec.scis.ecu.edu.au\/secauconfs\/proceedings\/2003\/forensics\/pdf\/11_final.pdf."},{"key":"e_1_3_2_1_28_1","first-page":"1","volume-title":"Eng. Manag. Syst. APIEMS 2004","author":"Schatz B.","year":"2016","unstructured":"B. Schatz , G. Mohay , and A. Clark , \" Rich Event Representation for Computer Forensics,\" Asia Pacific Ind . Eng. Manag. Syst. APIEMS 2004 , no. April 2016 , pp. 1 -- 16 , 2004, [Online]. Available : http:\/\/scholar.google.com\/scholar?hl=en&btnG=Search&q=intitle:RICH+EVENT+REPRESENTATION+FOR+COMPUTER+FORENSICS#0. B. Schatz, G. Mohay, and A. Clark, \"Rich Event Representation for Computer Forensics,\" Asia Pacific Ind. Eng. Manag. Syst. APIEMS 2004, no. April 2016, pp. 1--16, 2004, [Online]. Available: http:\/\/scholar.google.com\/scholar?hl=en&btnG=Search&q=intitle:RICH+EVENT+REPRESENTATION+FOR+COMPUTER+FORENSICS#0."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/J.DIIN.2004.03.001"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11534-9_9"},{"key":"e_1_3_2_1_31_1","first-page":"1","article-title":"Machine Learning for Post-Event Timeline Reconstruction","author":"Khan M. N.","year":"2006","unstructured":"M. N. Khan , E. Mnakhansussexacuk , and I. Wakeman , \" Machine Learning for Post-Event Timeline Reconstruction ,\" PGnet , pp. 1 -- 4 , 2006 . M. N. Khan, E. Mnakhansussexacuk, and I. Wakeman, \"Machine Learning for Post-Event Timeline Reconstruction,\" PGnet, pp. 1--4, 2006.","journal-title":"PGnet"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1363686.1364020"},{"volume-title":"Model Checking and the State Explosion Problem","author":"Clarke E. M.","key":"e_1_3_2_1_33_1","unstructured":"E. M. Clarke and W. Klieber , \" Model Checking and the State Explosion Problem ,\" vol. 1041377 , no. 2005, pp. 1--30, 2012. E. M. Clarke and W. Klieber, \"Model Checking and the State Explosion Problem,\" vol. 1041377, no. 2005, pp. 1--30, 2012."},{"volume-title":"https:\/\/docs.oracle.com\/javase\/tutorial\/java\/nutsandbolts\/datatypes.html (accessed","year":"2019","key":"e_1_3_2_1_34_1","unstructured":"\"Primitive Data Types (Learning the Java Language Basics),\" 2018. https:\/\/docs.oracle.com\/javase\/tutorial\/java\/nutsandbolts\/datatypes.html (accessed Aug. 07, 2019 ). \"Primitive Data Types (Learning the Java Language Basics),\" 2018. https:\/\/docs.oracle.com\/javase\/tutorial\/java\/nutsandbolts\/datatypes.html (accessed Aug. 07, 2019)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/b978--012369388-4\/50059-x"}],"event":{"name":"ARES 2020: The 15th International Conference on Availability, Reliability and Security","acronym":"ARES 2020","location":"Virtual Event Ireland"},"container-title":["Proceedings of the 15th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3407023.3407056","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3407023.3407056","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3407023.3407056","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:42Z","timestamp":1750195482000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3407023.3407056"}},"subtitle":["automated distributed file system storage state reconstruction"],"short-title":[],"issued":{"date-parts":[[2020,8,25]]},"references-count":35,"alternative-id":["10.1145\/3407023.3407056","10.1145\/3407023"],"URL":"https:\/\/doi.org\/10.1145\/3407023.3407056","relation":{},"subject":[],"published":{"date-parts":[[2020,8,25]]},"assertion":[{"value":"2020-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}