{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T18:33:29Z","timestamp":1763663609401},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.23919\/mipro.2017.7973612","type":"proceedings-article","created":{"date-parts":[[2017,7,25]],"date-time":"2017-07-25T19:28:35Z","timestamp":1501010915000},"page":"1233-1240","source":"Crossref","is-referenced-by-count":9,"title":["Anti-computer forensics"],"prefix":"10.23919","author":[{"given":"K.","family":"Hausknecht","sequence":"first","affiliation":[]},{"given":"S.","family":"Gruicic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Virtual Machines","year":"2016","key":"ref10"},{"journal-title":"NET MARKET SHARE","year":"2016","key":"ref11"},{"journal-title":"TechTarget","year":"2015","key":"ref12"},{"journal-title":"National Software Reference Library","year":"2016","key":"ref13"},{"journal-title":"File System","year":"2016","key":"ref14"},{"journal-title":"Anti-Forensic Techniques An Anlytical Review Thepar University","year":"2014","author":"chhabra","key":"ref15"},{"journal-title":"Breaking Forensics Software Weaknesses in Critical Evidence Collection","year":"2007","author":"palmer","key":"ref16"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.06.005"},{"journal-title":"How Computer Forensics Works","year":"2016","author":"strickland","key":"ref3"},{"year":"2016","key":"ref6"},{"journal-title":"Piriform","year":"2016","key":"ref5"},{"journal-title":"Brute forcing passwords","year":"2012","key":"ref8"},{"journal-title":"Gary Kessler Associates","year":"2015","author":"kessler","key":"ref7"},{"year":"2016","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2016.04.006"},{"journal-title":"Password combinations","year":"2016","key":"ref9"}],"event":{"name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","start":{"date-parts":[[2017,5,22]]},"location":"Opatija, Croatia","end":{"date-parts":[[2017,5,26]]}},"container-title":["2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7958418\/7973374\/07973612.pdf?arnumber=7973612","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T16:04:59Z","timestamp":1502899499000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7973612\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":16,"URL":"https:\/\/doi.org\/10.23919\/mipro.2017.7973612","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}