{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T18:03:33Z","timestamp":1725386613394},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.23919\/icact.2019.8701941","type":"proceedings-article","created":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T22:58:41Z","timestamp":1556837921000},"page":"1108-1115","source":"Crossref","is-referenced-by-count":0,"title":["Extracting Suspicious IP Addresses from WhatsApp Network Traffic in Cybercrime Investigations"],"prefix":"10.23919","author":[{"given":"Da-Yu","family":"KAO","sequence":"first","affiliation":[]},{"given":"En-Cih","family":"CHANG","sequence":"additional","affiliation":[]},{"given":"Fu-Ching","family":"TSAI","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"ISO\/IEC 27043 2015 Information Technology &#x2013; Security Techniques - Incident Investigation Principles and Processes","first-page":"5","year":"2015","key":"ref4"},{"key":"ref3","first-page":"2","author":"hartpence","year":"2014","journal-title":"Packet Guide to Voice over IP A system administrator's guide to VoIP technologies"},{"key":"ref10","first-page":"53","author":"sanders","year":"2017","journal-title":"Practical Packet Analysis Using Wireshark to Solve Real-World Network Problems (3rd Edition)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-6654-2_14"},{"journal-title":"the Number of monthly active WhatsApp users worldwide from April 2013 to December 2017 (in millions)","year":"0","key":"ref11"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2017.7890096"},{"key":"ref8","first-page":"19","author":"rahbar","year":"2015","journal-title":"Quality of service in optical packet switched networks"},{"key":"ref7","first-page":"56","author":"nath","year":"2015","journal-title":"Packet Analysis with Wireshark"},{"journal-title":"Computer Forensics Investigating Network Intrusions and Cyber Crime","first-page":"27","year":"2010","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1201\/b19551-2"},{"key":"ref1","first-page":"727","author":"casey","year":"2011","journal-title":"Digital Evidence and Computer Crime"}],"event":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","start":{"date-parts":[[2019,2,17]]},"location":"PyeongChang Kwangwoon_Do, Korea (South)","end":{"date-parts":[[2019,2,20]]}},"container-title":["2019 21st International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8694794\/8701885\/08701941.pdf?arnumber=8701941","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:07:16Z","timestamp":1558393636000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8701941\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":11,"URL":"https:\/\/doi.org\/10.23919\/icact.2019.8701941","relation":{},"subject":[],"published":{"date-parts":[[2019,2]]}}}