{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T00:02:54Z","timestamp":1725840174334},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319238012"},{"type":"electronic","value":"9783319238029"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23802-9_11","type":"book-chapter","created":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T07:24:43Z","timestamp":1448954683000},"page":"113-126","source":"Crossref","is-referenced-by-count":9,"title":["Forensic Potentials of Solid State Drives"],"prefix":"10.1007","author":[{"given":"Zubair","family":"Shah","sequence":"first","affiliation":[]},{"given":"Abdun Naser","family":"Mahmood","sequence":"additional","affiliation":[]},{"given":"Jill","family":"Slay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,19]]},"reference":[{"key":"11_CR1","unstructured":"Lofgren, K.M.J., Norman, R.D., Thelin, G.B., Gupta, A.: Wear leveling techniques for flash EEPROM systems, 8 May 2001 (U.S. Patent 6,230,233)"},{"issue":"1","key":"11_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1201\/1086\/43313.10.1.20010304\/31394.6","volume":"10","author":"KJ Flusche","year":"2001","unstructured":"Flusche, K.J.: Computer forensic case study: espionage, Part 1 just finding the file is not enough!. Inf. Syst. Secur. 10(1), 1\u201310 (2001)","journal-title":"Inf. Syst. Secur."},{"issue":"2","key":"11_CR3","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/S1363-4127(00)02006-9","volume":"5","author":"S Janes","year":"2000","unstructured":"Janes, S.: The role of technology in computer forensic investigations. Inf. Secur. Tech. Rep. 5(2), 43\u201350 (2000)","journal-title":"Inf. Secur. Tech. Rep."},{"key":"11_CR4","unstructured":"Guide, N., Ashcroft, J., Electronic Crime Scene Investigation: A Guide for First Responders Series: NIJ Guide"},{"issue":"2","key":"11_CR5","first-page":"1","volume":"2","author":"B Carrier","year":"2003","unstructured":"Carrier, B., Spafford, E.H.: Getting physical with the digital investigation process. Int. J. Digital Evid. 2(2), 1\u201320 (2003)","journal-title":"Int. J. Digital Evid."},{"key":"11_CR6","unstructured":"Boddington, R., Hobbs, V., Mann, G.: Validating digital evidence for legal argument (2008)"},{"key":"11_CR7","unstructured":"Berg, E.C.: Legal ramifications of digital imaging in law enforcement. Forensic Science Communications, 2(4) (2000)"},{"issue":"2","key":"11_CR8","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.diin.2005.02.001","volume":"2","author":"EE Kenneally","year":"2005","unstructured":"Kenneally, E.E., Brown, C.L.: Risk sensitive digital evidence collection. Digital Investig. 2(2), 101\u2013119 (2005)","journal-title":"Digital Investig."},{"key":"11_CR9","volume-title":"File System Forensic Analysis","author":"B Carrier","year":"2005","unstructured":"Carrier, B.: File System Forensic Analysis, vol. 3. Addison-Wesley, Boston (2005)"},{"key":"11_CR10","unstructured":"Kasavajhala, V.: Solid State Drive vs. Hard Disk Drive Price and Performance Study, Dell Technical White Paper, Dell Power Vault Storage Systems (2011)"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Hu, X.Y., et al.: Write amplification analysis in flash-based solid state drives. In: Proceedings of SYSTOR 2009, The Israeli Experimental Systems Conference. ACM (2009)","DOI":"10.1145\/1534530.1534544"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Lee, J., et al.: A semi-preemptive garbage collector for solid state drives. In: IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS). IEEE (2011)","DOI":"10.1109\/ISPASS.2011.5762711"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Seppanen, E., O\u2019Keefe, M.T., Lilja, D.J.: High performance solid state storage under linux. In: IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST). IEEE (2010)","DOI":"10.1109\/MSST.2010.5496976"},{"issue":"3","key":"11_CR14","first-page":"1","volume":"5","author":"GB Bell","year":"2010","unstructured":"Bell, G.B., Boddington, R.: Solid state drives: the beginning of the end for current practice in digital forensic recovery? J. Digital Forensics Secur. Law 5(3), 1\u201320 (2010)","journal-title":"J. Digital Forensics Secur. Law"},{"key":"11_CR15","unstructured":"Freeman, M., Woodward, A.: Secure state deletion: testing the efficacy and integrity of secure deletion tools on Solid State Drives. In: Australian Digital Forensics Conference (2009)"},{"key":"11_CR16","unstructured":"Olson, A.R., Langlois, D.J.: Solid state drives data reliability and lifetime. Imation White Paper (2008)"},{"key":"11_CR17","unstructured":"Agrawal, N., et al.: Design Tradeoffs for SSD Performance. In: USENIX Annual Technical Conference (2008)"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Chen, F., Koufaty, D.A., Zhang, X.: Understanding intrinsic characteristics and system implications of flash memory based solid state drives. In: Proceedings of the eleventh international joint conference on Measurement and Modeling of Computer Systems. ACM (2009)","DOI":"10.1145\/1555349.1555371"},{"key":"11_CR19","doi-asserted-by":"publisher","first-page":"S64","DOI":"10.1016\/j.diin.2010.05.009","volume":"7","author":"SL Garfinkel","year":"2010","unstructured":"Garfinkel, S.L.: Digital forensics research: the next 10 years. Digital Invest. 7, S64\u2013S73 (2010)","journal-title":"Digital Invest."},{"issue":"1","key":"11_CR20","first-page":"1941","volume":"2","author":"J Luck","year":"2008","unstructured":"Luck, J., Stokes, M.: An integrated approach to recovering deleted files from NAND flash data. Small Scale Digital Device Forensics J. 2(1), 1941\u20136164 (2008)","journal-title":"Small Scale Digital Device Forensics J."},{"issue":"4","key":"11_CR21","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1145\/1498765.1498791","volume":"52","author":"D Roberts","year":"2009","unstructured":"Roberts, D., Kgil, T., Mudge, T.: Integrating NAND flash devices onto servers. Commun. ACM 52(4), 98\u2013103 (2009)","journal-title":"Commun. ACM"},{"key":"11_CR22","unstructured":"Wei, M.Y.C., et al.: Reliably erasing data from flash-based solid state drives. In: Proceeding FAST (2011)"},{"key":"11_CR23","unstructured":"Arthur, K.K., Venter, H.S.: An investigation into computer forensic tools. In: Proceeding ISSA (2004)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","International Conference on Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23802-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T15:32:47Z","timestamp":1559316767000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-23802-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319238012","9783319238029"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23802-9_11","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]}}}