{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T23:27:30Z","timestamp":1725751650708},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642411472"},{"type":"electronic","value":"9783642411489"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41148-9_12","type":"book-chapter","created":{"date-parts":[[2013,10,9]],"date-time":"2013-10-09T18:47:31Z","timestamp":1381344451000},"page":"171-182","source":"Crossref","is-referenced-by-count":2,"title":["File Fragment Analysis Using Normalized Compression Distance"],"prefix":"10.1007","author":[{"given":"Stefan","family":"Axelsson","sequence":"first","affiliation":[]},{"given":"Kamran Ali","family":"Bajwa","sequence":"additional","affiliation":[]},{"given":"Mandhapati Venkata","family":"Srikanth","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-642-02620-1_4","volume-title":"Proceedings of the Fourteenth Australasian Conference on Information Security and Privacy","author":"I. Ahmed","year":"2009","unstructured":"I. Ahmed, K. Lhee, H. Shin and M. Hong, On improving the accuracy and performance of content-based file type identification, Proceedings of the Fourteenth Australasian Conference on Information Security and Privacy, pp. 44\u201359, 2009."},{"key":"12_CR2","first-page":"368","volume-title":"Proceedings of the Thirty-Fifth Annual IEEE Computer Software and Applications Conference Workshops","author":"L. Aronson","year":"2011","unstructured":"L. Aronson and J. van den Bos, Towards an engineering approach to file carver construction, Proceedings of the Thirty-Fifth Annual IEEE Computer Software and Applications Conference Workshops, pp. 368\u2013373, 2011."},{"issue":"S","key":"12_CR3","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.diin.2010.05.004","volume":"7","author":"S. Axelsson","year":"2010","unstructured":"S. Axelsson, The normalized compression distance as a file fragment classifier, Digital Investigation, vol. 7(S), pp. S24\u2013S31, 2010.","journal-title":"Digital Investigation"},{"key":"12_CR4","first-page":"641","volume-title":"Proceedings of the International Conference on Availibility, Reliability and Security","author":"S. Axelsson","year":"2010","unstructured":"S. Axelsson, Using normalized compression distance for classifying file fragments, Proceedings of the International Conference on Availibility, Reliability and Security, pp. 641\u2013646, 2010."},{"key":"12_CR5","unstructured":"M. Burrows and D. Wheeler, A Block-Sorting Lossless Data Compression Algorithm, Technical Report No. SRC-RR-124, Digital Equipment Corporation Systems Research Center, Palo Alto, California, 1994."},{"issue":"S","key":"12_CR6","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.diin.2008.05.005","volume":"5","author":"W. Calhoun","year":"2008","unstructured":"W. Calhoun and D. Coles, Predicting the types of file fragments, Digital Investigation, vol. 5(S), pp. S14\u2013S20, 2008.","journal-title":"Digital Investigation"},{"issue":"4","key":"12_CR7","doi-asserted-by":"publisher","first-page":"367","DOI":"10.4310\/CIS.2005.v5.n4.a1","volume":"5","author":"M. Cebrian","year":"2005","unstructured":"M. Cebrian, M. Alfonseca and A. Ortega, Common pitfalls using normalized compression distance: What to watch out for in a compressor, Communications in Information and Systems, vol. 5(4), pp. 367\u2013400, 2005.","journal-title":"Communications in Information and Systems"},{"issue":"5","key":"12_CR8","doi-asserted-by":"publisher","first-page":"1895","DOI":"10.1109\/TIT.2007.894669","volume":"53","author":"M. Cebrian","year":"2007","unstructured":"M. Cebrian, M. Alfonseca and A. Ortega, The normalized compression distance is resistant to noise, IEEE Transactions on Information Theory, vol. 53(5), pp. 1895\u20131990, 2007.","journal-title":"IEEE Transactions on Information Theory"},{"key":"12_CR9","unstructured":"R. Cilibrasi, Statistical Inference Through Data Compression, Ph.D. Thesis, Institute for Logic, Language and Computation, University of Amsterdam, Amsterdam, The Netherlands, 2007."},{"issue":"4","key":"12_CR10","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1109\/TCOM.1984.1096090","volume":"32","author":"J. Cleary","year":"1984","unstructured":"J. Cleary and I. Witten, Data compression using adaptive coding and partial string matching, IEEE Transactions on Communications, vol. 32(4), pp. 396\u2013402, 1984.","journal-title":"IEEE Transactions on Communications"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"P. Deutsch, DEFLATE Compressed Data Format Specification Version 1.3, RFC 1951, 1996.","DOI":"10.17487\/rfc1951"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"P. Deutsch, GZIP File Format Specification Version 4.3, RFC 1952, 1996.","DOI":"10.17487\/rfc1952"},{"key":"12_CR13","first-page":"178","volume-title":"Proceedings of the IEEE International Conference on Software Testing, Verification and Validation","author":"R. Feldt","year":"2008","unstructured":"R. Feldt, R. Torkar, T. Gorschek and W. Afzal, Searching for cognitively diverse tests: Towards universal test diversity metrics, Proceedings of the IEEE International Conference on Software Testing, Verification and Validation, pp. 178\u2013186, 2008."},{"issue":"S","key":"12_CR14","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.diin.2012.05.008","volume":"9","author":"S. Fitzgerald","year":"2012","unstructured":"S. Fitzgerald, G. Mathews, C. Morris and O. Zhulyn, Using NLP techniques for file fragment classification, Digital Investigation, vol. 9(S), pp. S44\u2013S49, 2012.","journal-title":"Digital Investigation"},{"issue":"S","key":"12_CR15","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.diin.2009.06.016","volume":"6","author":"S. Garfinkel","year":"2009","unstructured":"S. Garfinkel, P. Farrell, V. Roussev and D. Dinolt, Bringing science to digital forensics with standardized forensic corpora, Digital Investigation, vol. 6(S), pp. S2\u2013S11, 2009.","journal-title":"Digital Investigation"},{"key":"12_CR16","first-page":"236","volume-title":"Proceedings of the South African Information Security Multi-Conference","author":"Q. Li","year":"2010","unstructured":"Q. Li, A. Ong, P. Suganthan and V. Thing, A novel support vector machine approach to high entropy data fragment classification, Proceedings of the South African Information Security Multi-Conference, pp. 236\u2013247, 2010."},{"key":"12_CR17","first-page":"64","volume-title":"Proceedings of the Sixth Annual IEEE SMC Information Assurance Workshop","author":"W. Li","year":"2005","unstructured":"W. Li, K. Wang, S. Stolfo and B. Herzog, Fileprints: Identifying file types by n-gram analysis, Proceedings of the Sixth Annual IEEE SMC Information Assurance Workshop, pp. 64\u201371, 2005."},{"key":"12_CR18","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/IAS.2007.75","volume-title":"Proceedings of the Third International Symposium on Information Assurance and Security","author":"C. Veenman","year":"2007","unstructured":"C. Veenman, Statistical disk cluster classification for file carving, Proceedings of the Third International Symposium on Information Assurance and Security, pp. 393\u2013398, 2007."}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics IX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41148-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T21:02:27Z","timestamp":1558126947000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41148-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642411472","9783642411489"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41148-9_12","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2013]]}}}