{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:00:28Z","timestamp":1730343628957,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.23919\/icact.2018.8323758","type":"proceedings-article","created":{"date-parts":[[2018,4,11]],"date-time":"2018-04-11T21:11:35Z","timestamp":1523481095000},"page":"363-368","source":"Crossref","is-referenced-by-count":2,"title":["Forensic analysis of network packets from penetration test toolkits"],"prefix":"10.23919","author":[{"given":"Da-Yu","family":"Kao","sequence":"first","affiliation":[]},{"given":"Yu-Siang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Fu-Ching","family":"Tsai","sequence":"additional","affiliation":[]},{"given":"Chien-Hung","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"59","article-title":"Cyber Forensics: Understanding Information Security Investigations","volume":"59","author":"bayuk","year":"2010","journal-title":"Springer's Forensic Laboratory Science Series"},{"key":"ref3","first-page":"23","author":"baxter","year":"2014","journal-title":"Wireshark Essentials Get Up and Running with Wireshark to Analyze Network Packets and Protocols Effectively"},{"key":"ref10","first-page":"57","author":"raj","year":"2015","journal-title":"Python Penetration Testing Essentials"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-374267-4.00002-1"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2430-4_10"},{"key":"ref5","first-page":"13","author":"brooks","year":"2015","journal-title":"CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide"},{"key":"ref8","first-page":"25","author":"mehan","year":"2014","journal-title":"Cyberwar Cyberterror Cybercrime and Cyberactivism An In-depth Guide to the Role of Security Standards in the Cybersecurity Environment"},{"key":"ref7","first-page":"187","author":"casey","year":"2011","journal-title":"Digital evidence and computer crime Forensic science computers and the Internet"},{"key":"ref2","first-page":"1","author":"aquilina","year":"2008","journal-title":"Malware Forensics Investigating and Analyzing Malicious Code"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/9781119419303"},{"key":"ref1","first-page":"169","author":"andress","year":"2013","journal-title":"Cyber Warfare Techniques Tactics and Tools for Security Practitioners 2nd Ed"}],"event":{"name":"2018 20th International Conference on Advanced Communications Technology (ICACT)","start":{"date-parts":[[2018,2,11]]},"location":"Chuncheon-si Gangwon-do, Korea (South)","end":{"date-parts":[[2018,2,14]]}},"container-title":["2018 20th International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8318543\/8323471\/08323758.pdf?arnumber=8323758","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T06:11:00Z","timestamp":1598249460000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8323758\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2]]},"references-count":11,"URL":"https:\/\/doi.org\/10.23919\/icact.2018.8323758","relation":{},"subject":[],"published":{"date-parts":[[2018,2]]}}}