{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:46Z","timestamp":1750220626849,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,15]]},"DOI":"10.1145\/3409334.3452069","type":"proceedings-article","created":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T20:49:49Z","timestamp":1620679789000},"page":"33-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Teaching a computer forensics course"],"prefix":"10.1145","author":[{"given":"Farha","family":"Ali","sequence":"first","affiliation":[{"name":"Lander University"}]}],"member":"320","published-online":{"date-parts":[[2021,5,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Soft 32. 2020. Soft 32. https:\/\/dumpit.soft32.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Soft 32. 2020. WinPrefetchView. https:\/\/winprefetchview.soft32.com\/."},{"key":"e_1_3_2_1_3_1","unstructured":"aldeid. [n.d.]. PEView. https:\/\/www.aldeid.com\/wiki\/PEView."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","unstructured":"P. Allen J. Impagliazzo R. Raj H. Santos M. Asghar A. J\u00f8sang T. Pereira V\u00edtor J. S\u00e1 and E. Stavrou. 2018. Global Perspectives on Cybersecurity Education (ITiCSE 2018). Association for Computing Machinery New York NY USA 340--341. 10.1145\/3197091.3205840","DOI":"10.1145\/3197091.3205840"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409908.1409915"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568195.2568210"},{"key":"e_1_3_2_1_7_1","unstructured":"The Darkside. [n.d.]. The SNOW Home Page. http:\/\/www.darkside.com.au\/snow\/."},{"key":"e_1_3_2_1_8_1","unstructured":"Access Data. 2020. FTKImager. https:\/\/accessdata.com\/product-download."},{"key":"e_1_3_2_1_9_1","unstructured":"SANS DFIR. [n.d.]. Find Evil - Know Normal. https:\/\/digital-forensics.sans.org\/media\/SANS_Poster_2018_Hunt_Evil_FINAL.pdf."},{"key":"e_1_3_2_1_10_1","unstructured":"SAN DFIR. 2020. EZ Tools. https:\/\/digital-forensics.sans.org\/community\/downloads\/digital-forensics-tools."},{"key":"e_1_3_2_1_11_1","unstructured":"EDURange. 2020. EDURange. https:\/\/edurange.org."},{"key":"e_1_3_2_1_12_1","unstructured":"Volatility Foundation. 2020. Volatility Foundation. https:\/\/www.volatilityfoundation.org\/."},{"key":"e_1_3_2_1_13_1","unstructured":"P. Harvey. 2020. Read Write and Edit Meta Information. https:\/\/exiftool.org\/."},{"key":"e_1_3_2_1_14_1","unstructured":"lo4d.com. [n.d.]. Resource Hacker. https:\/\/resource-hacker.en.lo4d.com\/windows#."},{"key":"e_1_3_2_1_15_1","first-page":"1","article-title":"Hands-on Cybersecurity Exercises","volume":"34","author":"Mache J.","year":"2018","unstructured":"J. Mache and R. Weiss. 2018. Hands-on Cybersecurity Exercises. J. Comput. Sci. Coll. 34, 1 (Oct. 2018), 231--232.","journal-title":"J. Comput. Sci. Coll."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3349266.3355613"},{"key":"e_1_3_2_1_17_1","first-page":"5","article-title":"Enterprise Theory of Investigation","volume":"70","author":"Mcfeely R.","year":"2001","unstructured":"R. Mcfeely. 2001. Enterprise Theory of Investigation. The FBI Law Enforcement Bulletin 70, 5 (May 2001).","journal-title":"The FBI Law Enforcement Bulletin"},{"key":"e_1_3_2_1_18_1","unstructured":"Microsoft. 2020. Windows Sysinternals. https:\/\/docs.microsoft.com\/en-us\/sysinternals\/."},{"key":"e_1_3_2_1_19_1","unstructured":"MiniTool. 2020. MiniTool Partition Wizard 12.1. https:\/\/www.partitionwizard.com\/."},{"key":"e_1_3_2_1_20_1","unstructured":"NSA. 2020. National Centers of Academic Excellence. https:\/\/www.nsa.gov\/resources\/students-educators\/centers-academic-excellence\/."},{"key":"e_1_3_2_1_21_1","unstructured":"RemoteDLL. 2020. RemoteDLL. https:\/\/remotedll.en.lo4d.com\/windows."},{"key":"e_1_3_2_1_22_1","unstructured":"Softpedia. [n.d.]. tegoMagic. https:\/\/www.softpedia.com\/get\/Security\/Encrypting\/StegoMagic.shtml."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3372622"},{"key":"e_1_3_2_1_24_1","unstructured":"Kali Tools. 2020. RegRipper Package Description. https:\/\/tools.kali.org\/forensics\/regripper."},{"key":"e_1_3_2_1_25_1","first-page":"13","article-title":"On the Development of a Digital Forensics Curriculum","volume":"7","author":"Tu M.","year":"2012","unstructured":"M. Tu, D. Xu, C. Balan, and K. Cronin. 2012. On the Development of a Digital Forensics Curriculum. The Journal of Digital Forensics, Security and Law 7, 3 (2012), 13--32.","journal-title":"The Journal of Digital Forensics, Security and Law"},{"key":"e_1_3_2_1_26_1","unstructured":"K. Vasudevan. 2018. Digital Forensics---a Breadth-wise Overview. https:\/\/medium.com\/redefyn\/digital-forensics-a-breadth-wise-overview-2acb18803b74."},{"key":"e_1_3_2_1_27_1","unstructured":"VirusTotal. 2020. VirusTotal. https:\/\/www.virustotal.com\/gui\/home\/upload."},{"key":"e_1_3_2_1_28_1","first-page":"1","article-title":"EDURange: Hands-on Cybersecurity Exercises in the Cloud","volume":"30","author":"Weiss R.","year":"2014","unstructured":"R. Weiss, J. Mache, and M. Locasto. 2014. EDURange: Hands-on Cybersecurity Exercises in the Cloud. J. Comput. Sci. Coll. 30, 1 (Oct. 2014), 178--180.","journal-title":"J. Comput. Sci. Coll."},{"key":"e_1_3_2_1_29_1","first-page":"1","article-title":"EDURange: Hands-on Cybersecurity Exercises in the Cloud","volume":"30","author":"Weiss R.","year":"2014","unstructured":"R. Weiss, J. Mache, and M. Locasto. 2014. EDURange: Hands-on Cybersecurity Exercises in the Cloud. J. Comput. Sci. Coll. 30, 1 (Oct. 2014), 178--180.","journal-title":"J. Comput. Sci. Coll."},{"volume-title":"Workshop.","year":"2020","key":"e_1_3_2_1_30_1","unstructured":"Hex Workshop. 2020. . http:\/\/www.hexworkshop.com\/."},{"key":"e_1_3_2_1_31_1","unstructured":"E. Zimmerman. 2020. Eric Zimmerman's Tools. https:\/\/ericzimmerman.github.io\/#!index.md."}],"event":{"name":"ACM SE '21: 2021 ACM Southeast Conference","sponsor":["ACM Association for Computing Machinery"],"location":"Virtual Event USA","acronym":"ACM SE '21"},"container-title":["Proceedings of the 2021 ACM Southeast Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3409334.3452069","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3409334.3452069","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:33Z","timestamp":1750197693000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3409334.3452069"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,15]]},"references-count":31,"alternative-id":["10.1145\/3409334.3452069","10.1145\/3409334"],"URL":"https:\/\/doi.org\/10.1145\/3409334.3452069","relation":{},"subject":[],"published":{"date-parts":[[2021,4,15]]},"assertion":[{"value":"2021-05-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}