{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:24:57Z","timestamp":1725564297091},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642153921"},{"type":"electronic","value":"9783642153938"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15393-8_55","type":"book-chapter","created":{"date-parts":[[2010,9,5]],"date-time":"2010-09-05T11:21:58Z","timestamp":1283685718000},"page":"493-500","source":"Crossref","is-referenced-by-count":0,"title":["Evidence Analysis Method Using Bloom Filter for MANET Forensics"],"prefix":"10.1007","author":[{"given":"Takashi","family":"Mishina","sequence":"first","affiliation":[]},{"given":"Yoh","family":"Shiraishi","sequence":"additional","affiliation":[]},{"given":"Osamu","family":"Takahashi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"55_CR1","volume-title":"The Internet forensics \u2013 Gathering and analysis of electronic evidence to solve crime","author":"R. Jones","year":"2006","unstructured":"Jones, R.: The Internet forensics \u2013 Gathering and analysis of electronic evidence to solve crime. O\u2019Reilly, Japan (2006)"},{"key":"55_CR2","unstructured":"Otaka, A., Takahashi, O., Takagi, T.: Reliable Method for Collecting and Evaluating Transmission Records for MANET Forensics. In: Proc. of International Workshop on Infomatics (IWIN 2008), pp. 24\u201327 (2008)"},{"key":"55_CR3","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-540-85567-5_23","volume-title":"Knowledge-Based Intelligent Information and Engineering Systems","author":"A. Otaka","year":"2008","unstructured":"Otaka, A., Takagi, T., Takahashi, O.: Network Forensics on Mobile Ad-hoc Networks. In: Lovrek, I., Howlett, R.J., Jain, L.C. (eds.) KES 2008, Part III. LNCS (LNAI), vol.\u00a05179, pp. 175\u2013182. Springer, Heidelberg (2008)"},{"issue":"7","key":"55_CR4","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"B.H. Bloom","year":"1970","unstructured":"Bloom, B.H.: Space\/time trade-offs in hash coding with allowable errors. Communications of the ACM\u00a013(7), 422\u2013426 (1970)","journal-title":"Communications of the ACM"},{"key":"55_CR5","unstructured":"Tsujii, S. (editorial supervisor): Digital forensics dictionary, Digital forensics society (2006)"},{"key":"55_CR6","unstructured":"Itou, T.N.M.: Trend of forensics technology that uses network information. NTT Journal, 36\u201340 (2004)"},{"key":"55_CR7","first-page":"1","volume-title":"Proc. IEEE Workshop on Visualization for Computer Security (VizSEC 2005)","author":"K. Abdullah","year":"2005","unstructured":"Abdullah, K., Lee, C., Conti, G.J., Copeland, J.A., Stasko, J.T.: IDS RainStorm: Visualizing IDS Alarms. In: Proc. IEEE Workshop on Visualization for Computer Security (VizSEC 2005), pp. 1\u201310. IEEE Computer Society, Los Alamitos (2005)"},{"key":"55_CR8","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/VIZSEC.2005.1532070","volume-title":"Proc. IEEE Workshop on Visualization for Computer Security (VizSEC 2005)","author":"H. Koike","year":"2005","unstructured":"Koike, H., Ohno, K., Koizumi, K.: Visualizing Cyber Attacks using IP Matrix. In: Proc. IEEE Workshop on Visualization for Computer Security (VizSEC 2005), pp. 91\u201398. IEEE Computer Society, Los Alamitos (2005)"}],"container-title":["Lecture Notes in Computer Science","Knowledge-Based and Intelligent Information and Engineering Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15393-8_55.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:53:09Z","timestamp":1619787189000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15393-8_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642153921","9783642153938"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15393-8_55","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}