{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T15:04:10Z","timestamp":1777043050037,"version":"3.51.4"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1109\/imf.2013.17","type":"proceedings-article","created":{"date-parts":[[2013,8,1]],"date-time":"2013-08-01T16:12:45Z","timestamp":1375373565000},"page":"83-97","source":"Crossref","is-referenced-by-count":8,"title":["Anti-forensics: The Next Step in Digital Forensics Tool Testing"],"prefix":"10.1109","author":[{"given":"Martin","family":"Wundram","sequence":"first","affiliation":[]},{"given":"Felix C.","family":"Freiling","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Moch","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","author":"walker-morgan","year":"0","journal-title":"Zero Day Exploit for Internet Explorer Is Spreading"},{"key":"17","author":"rogers","year":"2005","journal-title":"Anti-forensics (Presentation Slides for Lockheed Martin)"},{"key":"18","article-title":"Anti-forensics and the digital investigator","author":"kessler","year":"2007","journal-title":"Proceedings of the 5th Australian Digital Forensics Conference Edith Cowan University"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"16","author":"peron","year":"0","journal-title":"Digital Anti-forensics Emerging Trends in Data Transformation Techniques"},{"key":"13","author":"carrier","year":"0","journal-title":"The Sleuth Kit"},{"key":"14","year":"0","journal-title":"Encase"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.4018\/jdcf.2009070105"},{"key":"12","author":"newsham","year":"2007","journal-title":"Breaking Forensics Software Weaknesses in Critical Evidence Collection"},{"key":"3","article-title":"General test methodology for computer forensic tools","year":"2001","journal-title":"Tech Rep Version 1 9"},{"key":"20","author":"janc","year":"2011","journal-title":"Rootkits in Your Web Application"},{"key":"2","year":"2003","journal-title":"Computer Forensics Tool Testing Program Project Overview"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.IR.7490","volume":"7490","author":"lyle","year":"2008","journal-title":"Digital Forensics at the National Institute of Standards and Technology"},{"key":"10","article-title":"Brief introduction to counter-forensics","author":"kuncik","year":"2010","journal-title":"Digital Forensics Magazine"},{"key":"7","first-page":"77","article-title":"Anti-forensics: Techniques, detection and countermeasures","author":"garfinkel","year":"2007","journal-title":"Proceedings of the 2nd International Conference on Information Warfare"},{"key":"6","author":"carrier","year":"2005","journal-title":"File System Forensic Analysis"},{"key":"5","author":"carrier","year":"0","journal-title":"Digital Forensics Tool Testing Images"},{"key":"4","article-title":"Digital data acquisition tool test assertions and test plan","year":"2005","journal-title":"IEC Draft"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(08)70143-0"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.06.005"}],"event":{"name":"2013 Seventh International Conference on lT Security lncident Management and lT Forensics (IMF)","location":"Nuremberg, Germany","start":{"date-parts":[[2013,3,12]]},"end":{"date-parts":[[2013,3,14]]}},"container-title":["2013 Seventh International Conference on IT Security Incident Management and IT Forensics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6568360\/6568536\/06568557.pdf?arnumber=6568557","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,20]],"date-time":"2019-07-20T02:37:54Z","timestamp":1563590274000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6568557\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/imf.2013.17","relation":{},"subject":[],"published":{"date-parts":[[2013,3]]}}}