{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T23:18:31Z","timestamp":1725405511097},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1109\/aina.2013.133","type":"proceedings-article","created":{"date-parts":[[2013,6,26]],"date-time":"2013-06-26T17:24:29Z","timestamp":1372267469000},"page":"405-412","source":"Crossref","is-referenced-by-count":1,"title":["Forensically-Sound Methods to Collect Live Network Evidence"],"prefix":"10.1109","author":[{"given":"A.","family":"Castiglione","sequence":"first","affiliation":[]},{"given":"G.","family":"Cattaneo","sequence":"additional","affiliation":[]},{"given":"G.","family":"De Maio","sequence":"additional","affiliation":[]},{"given":"A.","family":"De Santis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"TCPDUMP\/LIBPCAP public repository","year":"2012","key":"19"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/INCoS.2011.129"},{"journal-title":"WebCase by Vere Software","year":"0","key":"17"},{"journal-title":"Hashbot by Digital-Security IT","year":"0","key":"18"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2012.127"},{"journal-title":"Online Evidence Admissibility - WebCase WebLog","year":"2012","key":"15"},{"key":"34","first-page":"430","author":"castiglione","year":"2012","journal-title":"How to Forge a Digital Alibi on Mac OS X"},{"journal-title":"Tor Project Anonymity Online","year":"2012","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-84927-0_1"},{"journal-title":"Network Forensics Tracking Hackers through Cyberspace","year":"2012","author":"davidoff","key":"14"},{"key":"11","first-page":"416","author":"colombini","year":"2012","journal-title":"Network Profiling Content Analysis of Users Behavior in Digital Communication Channel"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2005.08.001"},{"journal-title":"Riverbed Technology","year":"2010","key":"21"},{"journal-title":"Wireshark Go deep","year":"2012","key":"20"},{"journal-title":"Internet Archive","year":"0","key":"22"},{"journal-title":"Page Saver","year":"0","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.08.012"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.05.002"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2011.60"},{"key":"27","first-page":"344","author":"castiglione","year":"2011","journal-title":"New Steganographic Techniques for the OOXML File Format"},{"key":"28","first-page":"537","author":"palmieri","year":"2006","journal-title":"Audit-based Access Control in Nomadic Wireless Environments"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1155\/2011\/404328"},{"journal-title":"U S Department of Justice Report","article-title":"Searching and seizing computers and obtaining electronic evidence in criminal investigations","year":"2002","key":"3"},{"journal-title":"Computer Forensics Tool Testing (CFTT) Project Tech Rep","article-title":"Disk imaging tool specification","year":"2001","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2012.125"},{"journal-title":"Association of Chief Police Officers Tech Rep","article-title":"Good practice guide for computer based evidence","year":"1999","key":"1"},{"journal-title":"Free Remote Desktop Control","year":"2012","key":"30"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2011.62"},{"journal-title":"Computer Forensics An Essential Guide for Accountants Lawyers and Managers","year":"2007","author":"sheetz","key":"6"},{"key":"32","first-page":"359","author":"de santis","year":"2011","journal-title":"Automated Construction of a False Digital Alibi"},{"journal-title":"Computer Forensics Incident Response Essentials","year":"2001","author":"kruse","key":"5"},{"journal-title":"Mozilla Firefox Web Browser","year":"2012","key":"31"},{"journal-title":"Digital Forensics Standards and Capacity Building","year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/INCoS.2011.17"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2011.64"}],"event":{"name":"2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA)","start":{"date-parts":[[2013,3,25]]},"location":"Barcelona","end":{"date-parts":[[2013,3,28]]}},"container-title":["2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6512431\/6531716\/06531784.pdf?arnumber=6531784","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T03:20:05Z","timestamp":1490239205000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6531784\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/aina.2013.133","relation":{},"subject":[],"published":{"date-parts":[[2013,3]]}}}