{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T23:27:27Z","timestamp":1725751647000},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642411472"},{"type":"electronic","value":"9783642411489"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41148-9_17","type":"book-chapter","created":{"date-parts":[[2013,10,9]],"date-time":"2013-10-09T14:47:31Z","timestamp":1381330051000},"page":"243-255","source":"Crossref","is-referenced-by-count":0,"title":["A Generic Bayesian Belief Model for Similar Cyber Crimes"],"prefix":"10.1007","author":[{"given":"Hayson","family":"Tse","sequence":"first","affiliation":[]},{"given":"Kam-Pui","family":"Chow","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Kwan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Automated Reasoning Group, SamIam, University of California at Los Angeles, Los Angeles, California (\n \n reasoning.cs.ucla.edu\/samiam\n \n \n ), 2010."},{"key":"17_CR2","unstructured":"R. Blincoe, Police sitting on forensic backlog risk, says top e-cop, The Register (\n \n www.theregister.co.uk\/2009\/11\/13\/police_forensics_tool\n \n \n ), November 13, 2009."},{"key":"17_CR3","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/SADFE.2009.8","volume-title":"Proceedings of the Fourth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering","author":"F. Cohen","year":"2009","unstructured":"F. Cohen, Two models of digital forensic examination, Proceedings of the Fourth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 42\u201353, 2009."},{"key":"17_CR4","unstructured":"District Court of the Hong Kong Special Administrative Region, HKSAR against Man-Fai Tse, Criminal Case No. 1318 of 2011, Hong Kong, China, 2012."},{"key":"17_CR5","first-page":"217","volume-title":"Proceedings of the Argentine Conference on Informatics and Argentine Symposium on Computing and Law","author":"L. Gomez","year":"2012","unstructured":"L. Gomez, Triage in-Lab: Case backlog reduction with forensic digital profiling, Proceedings of the Argentine Conference on Informatics and Argentine Symposium on Computing and Law, pp. 217\u2013225, 2012."},{"key":"17_CR6","unstructured":"D. Heckerman, A Tutorial on Learning with Bayesian Networks, Technical Report MSR-TR-95-06, Microsoft Research, Advanced Technology Division, Microsoft, Redmond, Washington, 1996."},{"key":"17_CR7","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/978-0-387-84927-0_22","volume-title":"Advances in Digital Forensics IV","author":"M. Kwan","year":"2008","unstructured":"M. Kwan, K. Chow, F. Law and P. Lai, Reasoning about evidence using Bayesian networks, in Advances in Digital Forensics IV, I. Ray and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 275\u2013289, 2008."},{"key":"17_CR8","volume-title":"Learning Bayesian Networks","author":"R. Neapolitan","year":"2003","unstructured":"R. Neapolitan, Learning Bayesian Networks, Prentice-Hall, Upper Saddle River, New Jersey, 2003."},{"key":"17_CR9","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-642-04155-6_17","volume-title":"Advances in Digital Forensics V","author":"R. Overill","year":"2009","unstructured":"R. Overill, M. Kwan, K. Chow, P. Lai and F. Law, A cost-effective model for digital forensic investigations, in Advances in Digital Forensics V, G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 231\u2013240, 2009."},{"key":"17_CR10","volume-title":"Proceedings of the Fourth International Conference on Cybercrime Forensics Education and Training","author":"R. Overill","year":"2010","unstructured":"R. Overill and J. Silomon, Digital meta-forensics: Quantifying the investigation, Proceedings of the Fourth International Conference on Cybercrime Forensics Education and Training, 2010."},{"key":"17_CR11","volume-title":"Probabilistic Reasoning in Intelligent Systems","author":"J. Pearl","year":"1997","unstructured":"J. Pearl, Probabilistic Reasoning in Intelligent Systems, Morgan Kaufmann, San Francisco, California, 1997."},{"issue":"2","key":"17_CR12","first-page":"19","volume":"1","author":"M. Rogers","year":"2006","unstructured":"M. Rogers, J. Goldman, R. Mislan, T. Wedge and S. Debrota, Computer Forensics Field Triage Process Model, Journal of Digital Forensics, Security and Law, vol. 1(2), pp. 19\u201337, 2006.","journal-title":"Journal of Digital Forensics, Security and Law"},{"issue":"3","key":"17_CR13","first-page":"335","volume":"10","author":"R. Sullivan","year":"1982","unstructured":"R. Sullivan and H. Delaney, Criminal investigations \u2013 A decision-making process, Journal of Police Science and Administration, vol. 10(3), pp. 335\u2013343, 1982.","journal-title":"Journal of Police Science and Administration"},{"key":"17_CR14","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-642-33962-2_7","volume-title":"Advances in Digital Forensics VIII","author":"H. Tse","year":"2012","unstructured":"H. Tse, K. Chow and M. Kwan, Reasoning about evidence using Bayesian networks, in Advances in Digital Forensics VIII, G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 99\u2013113, 2012."},{"key":"17_CR15","unstructured":"Tuen Mun Magistrates Court of the Hong Kong Special Administrative Region, HKSAR against Nai-Ming Chan, Criminal Case No. 1268 of 2005, Hong Kong, China, 2005."},{"key":"17_CR16","first-page":"66","volume-title":"Proceedings of the International Multi-Conference on Computing in the Global Information Technology","author":"Y. Xiang","year":"2006","unstructured":"Y. Xiang and Z. Li, An analytical model for DDoS attacks and defense, Proceedings of the International Multi-Conference on Computing in the Global Information Technology, p. 66, 2006."}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics IX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41148-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T15:54:48Z","timestamp":1558108488000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41148-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642411472","9783642411489"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41148-9_17","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2013]]}}}