{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T23:27:24Z","timestamp":1725751644222},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642411472"},{"type":"electronic","value":"9783642411489"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41148-9_22","type":"book-chapter","created":{"date-parts":[[2013,10,9]],"date-time":"2013-10-09T18:47:31Z","timestamp":1381344451000},"page":"331-347","source":"Crossref","is-referenced-by-count":1,"title":["Comparison of the Data Recovery Function of Forensic Tools"],"prefix":"10.1007","author":[{"given":"Joe","family":"Buchanan-Wollaston","sequence":"first","affiliation":[]},{"given":"Tim","family":"Storer","sequence":"additional","affiliation":[]},{"given":"William","family":"Glisson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"AccessData, FTK, Linden, Utah (\n \n accessdata.com\/products\/computer-forensics\/ftk\n \n \n , 2011."},{"key":"22_CR2","unstructured":"C. Ball, FTK 2.0: Product review, Electronic Data Discovery Update Weblog (\n \n commonscold.typepad.com\/eddupdate\/2008\/05\/ftk-20-product.html#more\n \n \n ), May 8, 2008."},{"key":"22_CR3","first-page":"78","volume-title":"Proceedings of the Second International ICST Conference on Digital Forensics and Cyber Crime","author":"H. Bariki","year":"2010","unstructured":"H. Bariki, M. Hashmi and I. Baggili, Defining a standard for reporting digital evidence items in computer forensic tools, Proceedings of the Second International ICST Conference on Digital Forensics and Cyber Crime, pp. 78\u201395, 2010."},{"key":"22_CR4","unstructured":"B. Carrier, Open Source Digital Forensic Tools: The Legal Argument, White Paper, @Stake, Cambridge, Massachusetts, 2002."},{"key":"22_CR5","volume-title":"File System Forensic Analysis","author":"B. Carrier","year":"2005","unstructured":"B. Carrier, File System Forensic Analysis, Pearson Education, Upper Saddle River, New Jersey, 2005."},{"key":"22_CR6","unstructured":"B. Carrier, The Sleuth Kit (\n \n www.sleuthkit.org\/sleuthkit\n \n \n ), 2011."},{"issue":"2","key":"22_CR7","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1504\/IJESDF.2009.024902","volume":"2","author":"D. Childs","year":"2009","unstructured":"D. Childs and P. Stephens, An analysis of the accuracy and usefulness of Vinetto, Pasco and mork.pl, International Journal of Electronic Security and Digital Forensics, vol. 2(2), pp. 182\u2013198, 2009.","journal-title":"International Journal of Electronic Security and Digital Forensics"},{"key":"22_CR8","volume-title":"Scene of the Cybercrime","author":"M. Cross","year":"2008","unstructured":"M. Cross, Scene of the Cybercrime, Syngress, Burlington, Massachusetts, 2008."},{"key":"22_CR9","unstructured":"Forensic Focus Blog, What happened to FTK2? (\n \n forensicfocus.blogspot.com\/2008\/05\/what-happened-to-ftk-2.html\n \n \n ), May 20, 2008."},{"issue":"S","key":"22_CR10","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.diin.2009.06.016","volume":"6","author":"S. Garfinkel","year":"2009","unstructured":"S. Garfinkel, P. Farrell, V. Roussev and G. Dinolt, Bringing science to digital forensics through standardized forensic corpora, Digital Investigation, vol. 6(S), pp. S2\u2013S7, 2009.","journal-title":"Digital Investigation"},{"key":"22_CR11","unstructured":"GetData, Mount Image Pro v4, Kogarah, Australia (\n \n mountimage.com\n \n \n ), 2011."},{"issue":"6","key":"22_CR12","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/s10207-011-0144-3","volume":"10","author":"W. Glisson","year":"2011","unstructured":"W. Glisson, T. Storer, G. Mayall, I. Moug and G. Grispos, Electronic retention: What does your mobile phone reveal about you? International Journal of Information Security, vol. 10(6), pp. 337\u2013349, 2011.","journal-title":"International Journal of Information Security"},{"key":"22_CR13","unstructured":"Guidance Software, EnCase Forensic, Pasadena, California (\n \n www.guidancesoftware.com\/forensic.htm\n \n \n ), 2011."},{"key":"22_CR14","unstructured":"N. Harbour, dcfldd version 1.3.4-1 (\n \n dcfldd.sourceforge.net\n \n \n ), 2006."},{"key":"22_CR15","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/IMF.2011.11","volume-title":"Proceedings of the Sixth International Conference on IT Security Incident Management and IT Forensics","author":"M. Hildebrandt","year":"2011","unstructured":"M. Hildebrandt, S. Kiltz and J. Dittmann, A common scheme for evaluation of forensic software, Proceedings of the Sixth International Conference on IT Security Incident Management and IT Forensics, pp. 92\u2013106, 2011."},{"issue":"3","key":"22_CR16","first-page":"162","volume":"4","author":"A. Jones","year":"2009","unstructured":"A. Jones, G. Dardick, G. Davies, I. Sutherland and C. Valli, The 2008 analysis of information remaining on disks offered for sale on the second hand market, Journal of International Commercial Law and Technology, vol. 4(3), pp. 162\u2013175, 2009.","journal-title":"Journal of International Commercial Law and Technology"},{"key":"22_CR17","first-page":"266","volume-title":"Proceedings of the Fortieth Annual Hawaii International Conference on System Sciences","author":"D. Manson","year":"2007","unstructured":"D. Manson, A. Carlin, S. Ramos, A. Gyger, M. Kaufman and J. Treichelt, Is the open way a better way? Digital forensics using open source tools, Proceedings of the Fortieth Annual Hawaii International Conference on System Sciences, pp. 266b, 2007."},{"key":"22_CR18","first-page":"132","volume-title":"Proceedings of the First International ICST Conference on Digital Forensics and Cyber Crime","author":"R. Mercuri","year":"2009","unstructured":"R. Mercuri, Criminal defense challenges in computer forensics, Proceedings of the First International ICST Conference on Digital Forensics and Cyber Crime, pp. 132\u2013138, 2009."},{"key":"22_CR19","unstructured":"National Institute of Standards and Technology, Active File Identification and Deleted File Recovery Tool Specification, National Institute of Standards and Technology, Draft for Comment 1 of Version 1.1, Gaithersburg, Maryland, 2009."},{"key":"22_CR20","unstructured":"National Institute of Standards and Technology, Computer Forensics Tool Testing Program, Gaithersburg, Maryland (\n \n www.cftt.nist.gov\n \n \n ), 2011."},{"key":"22_CR21","unstructured":"L. Pascoe, MD5summer (\n \n md5summer.org\n \n \n ), 2011."},{"key":"22_CR22","unstructured":"SC Magazine, Forensic tools 2006, New York (\n \n www.scmagazineus.com\/forensic-tools-2006\/grouptest\/37\n \n \n ), July 11, 2006."},{"key":"22_CR23","unstructured":"Where is Your Data? Weblog, Forensics: FTK 2 (\n \n whereismydata.wordpress.com\/2009\/03\/01\/forensics-ftk-2\n \n \n ), March 1, 2009."}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics IX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41148-9_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T20:40:48Z","timestamp":1558125648000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41148-9_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642411472","9783642411489"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41148-9_22","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2013]]}}}