{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T23:27:21Z","timestamp":1725751641612},"publisher-location":"Berlin, Heidelberg","reference-count":54,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642411472"},{"type":"electronic","value":"9783642411489"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41148-9_3","type":"book-chapter","created":{"date-parts":[[2013,10,9]],"date-time":"2013-10-09T18:47:31Z","timestamp":1381344451000},"page":"33-49","source":"Crossref","is-referenced-by-count":3,"title":["On the Scientific Maturity of Digital Forensics Research"],"prefix":"10.1007","author":[{"given":"Martin","family":"Olivier","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Gruner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-642-15506-2_7","volume-title":"Advances in Digital Forensics VI","author":"S. Al-Kuwari","year":"2010","unstructured":"S. Al-Kuwari and S. Wolthusen, Forensic tracking and mobility prediction in vehicular networks, in Advances in Digital Forensics VI, K. Chow and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 91\u2013105, 2010."},{"key":"3_CR2","first-page":"3","volume-title":"Advances in Digital Forensics","author":"N. Beebe","year":"2005","unstructured":"N. Beebe and J. Clark, Dealing with terabyte data sets in digital investigations, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 3\u201316, 2005."},{"key":"3_CR3","volume-title":"Philosophy of Science (Volume One): From Problem to Theory","author":"M. Bunge","year":"1998","unstructured":"M. Bunge, Philosophy of Science (Volume One): From Problem to Theory, Transaction Publishers, New Brunswick, New Jersey, 1998."},{"key":"3_CR4","volume-title":"Philosophy of Science (Volume Two): From Explanation to Justification","author":"M. Bunge","year":"1998","unstructured":"M. Bunge, Philosophy of Science (Volume Two): From Explanation to Justification, Transaction Publishers, New Brunswick, New Jersey, 1998."},{"key":"3_CR5","first-page":"271","volume-title":"Advances in Digital Forensics","author":"Y. Chen","year":"2005","unstructured":"Y. Chen, V. Roussev, G. Richard and Y. Gao, Content-based image retrieval for digital forensics, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 271\u2013282, 2005."},{"key":"3_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15506-2","volume-title":"Advances in Digital Forensics VI","author":"K. Chow","year":"2010","unstructured":"K. Chow and S. Shenoi, Advances in Digital Forensics VI, Springer, Heidelberg, Germany, 2010."},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-15506-2_2","volume-title":"Advances in Digital Forensics VI","author":"F. Cohen","year":"2010","unstructured":"F. Cohen, Toward a science of digital forensic evidence examination, in Advances in Digital Forensics VI, K. Chow and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 17\u201335, 2010."},{"key":"3_CR8","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-642-15506-2_5","volume-title":"Advances in Digital Forensics VI","author":"S. Conrad","year":"2010","unstructured":"S. Conrad, G. Dorn and P. Craiger, Forensic analysis of a Playstation-3 console, in Advances in Digital Forensics VI, K. Chow and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 65\u201376, 2010."},{"key":"3_CR9","first-page":"233","volume-title":"Advances in Digital Forensics","author":"P. Craiger","year":"2005","unstructured":"P. Craiger, Recovering digital evidence from Linux systems, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 233\u2013244, 2005."},{"key":"3_CR10","first-page":"33","volume-title":"Advances in Digital Forensics","author":"M. Davis","year":"2005","unstructured":"M. Davis, G. Manes and S. Shenoi, A network-based architecture for storing digital evidence, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 33\u201342, 2005."},{"key":"3_CR11","first-page":"91","volume-title":"Advances in Digital Forensics","author":"T. Duval","year":"2005","unstructured":"T. Duval, B. Jouga and L. Roger, The Mitnick case: How Bayes could have helped, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 91\u2013104, 2005."},{"key":"3_CR12","first-page":"113","volume-title":"Advances in Digital Forensics","author":"B. Fei","year":"2005","unstructured":"B. Fei, J. Eloff, H. Venter and M. Olivier, Exploring forensic data with self-organizing maps, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 113\u2013123, 2005."},{"key":"3_CR13","first-page":"217","volume-title":"Advances in Digital Forensics","author":"P. Gershteyn","year":"2005","unstructured":"P. Gershteyn, M. Davis, G. Manes and S. Shenoi, Extracting concealed data from BIOS chips, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 217\u2013230, 2005"},{"key":"3_CR14","unstructured":"P. Giannelli, Wrongful Convictions and Forensic Science: The Need to Regulate Crime Labs, Working Paper 08-02, School of Law, Case Western Reserve University, Cleveland, Ohio, 2008."},{"key":"3_CR15","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-642-15506-2_10","volume-title":"Advances in Digital Forensics VI","author":"M. Gunestas","year":"2010","unstructured":"M. Gunestas, M. Mehmet and D. Wijsekera, Detecting Ponzi and pyramid business schemes in choreographed web services, in Advances in Digital Forensics VI, K. Chow and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 133\u2013150, 2010."},{"key":"3_CR16","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-642-15506-2_21","volume-title":"Advances in Digital Forensics VI","author":"Y. Guo","year":"2010","unstructured":"Y. Guo and J. Slay, Data recovery function testing for digital forensic tools, in Advances in Digital Forensics VI, K. Chow and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 297\u2013311, 2010."},{"key":"3_CR17","first-page":"67","volume-title":"Advances in Digital Forensics","author":"M. Hoeschele","year":"2005","unstructured":"M. Hoeschele and M. Rogers, Detecting social engineering, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 67\u201377, 2005."},{"key":"3_CR18","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-642-15506-2_11","volume-title":"Advances in Digital Forensics VI","author":"R. Ieong","year":"2010","unstructured":"R. Ieong, P. Lai, K. Chow, M. Kwan and F. Law, Identifying first seeders in Foxy peer-to-peer networks, in Advances in Digital Forensics VI, K. Chow and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 151\u2013168, 2010."},{"key":"3_CR19","first-page":"153","volume-title":"Advances in Digital Forensics","author":"P. Kahai","year":"2005","unstructured":"P. Kahai, M. Srinivasan, K. Namuduri and R. Pendse, Forensic profiling system, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 153\u2013164, 2005."},{"key":"3_CR20","first-page":"165","volume-title":"Advances in Digital Forensics","author":"E. Kim","year":"2005","unstructured":"E. Kim, D. Massey and I. Ray, Global Internet routing forensics, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 165\u2013176, 2005."},{"key":"3_CR21","unstructured":"R. Koppl and M. Ferraro, Digital devices and miscarriages of justice, Daily Caller ( dailycaller.com\/2012\/06\/15\/digital-devices-and-miscarriages-of-justice ), June 15, 2012."},{"key":"3_CR22","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-642-15506-2_9","volume-title":"Advances in Digital Forensics VI","author":"M. Kwan","year":"2010","unstructured":"M. Kwan, R. Overill, K. Chow, J. Silomon, H. Tse, F. Law and P. Lai, Evaluation of evidence in Internet auction fraud investigations, in Advances in Digital Forensics VI, K. Chow and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 121\u2013132, 2010."},{"key":"3_CR23","first-page":"105","volume-title":"Advances in Digital Forensics","author":"R. Laubscher","year":"2005","unstructured":"R. Laubscher, D. Rabe, M. Olivier, J. Eloff and H. Venter, Applying forensic principles to computer-based assessment, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 105\u2013112, 2005."},{"key":"3_CR24","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-3-642-15506-2_13","volume-title":"Advances in Digital Forensics VI","author":"F. Law","year":"2010","unstructured":"F. Law, P. Chan, S. Yiu, B. Tang, P. Lai, K. Chow, R. Ieong, M. Kwan, W. Hon and L. Hui, Identifying volatile data from multiple memory dumps in live forensics, in Advances in Digital Forensics VI, K. Chow and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 185\u2013194, 2010."},{"key":"3_CR25","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-642-15506-2_4","volume-title":"Advances in Digital Forensics VI","author":"F. Li","year":"2010","unstructured":"F. Li, H. Chan, K. Chow and P. Lai, An analysis of the Green Dam Youth Escort Software, in Advances in Digital Forensics VI, K. Chow and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 49\u201362, 2010."},{"key":"3_CR26","first-page":"51","volume-title":"Advances in Digital Forensics","author":"M. Losavio","year":"2005","unstructured":"M. Losavio, Non-technical manipulation of digital data, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 51\u201363, 2005."},{"key":"3_CR27","first-page":"43","volume-title":"Advances in Digital Forensics","author":"M. Meyers","year":"2005","unstructured":"M. Meyers and M. Rogers, Digital forensics: Meeting the challenges of scientific evidence, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 43\u201350, 2005."},{"key":"3_CR28","first-page":"177","volume-title":"Advances in Digital Forensics","author":"T. Moore","year":"2005","unstructured":"T. Moore, A. Meehan, G. Manes and S. Shenoi, Using signaling information in telecom network forensics, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 177\u2013188, 2005."},{"key":"3_CR29","first-page":"303","volume-title":"Advances in Digital Forensics","author":"Y. Motora","year":"2005","unstructured":"Y. Motora and B. Irwin, In-kernel cryptographic executable verification, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 303\u2013313, 2005."},{"key":"3_CR30","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/978-3-642-15506-2_19","volume-title":"Advances in Digital Forensics VI","author":"Y. Nakayama","year":"2010","unstructured":"Y. Nakayama, S. Shibaguchi and K. Okada, A visualization system for analyzing information leakage, in Advances in Digital Forensics VI, K. Chow and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 269\u2013282, 2010."},{"key":"3_CR31","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-642-15506-2_8","volume-title":"Advances in Digital Forensics VI","author":"S. Ngobeni","year":"2010","unstructured":"S. Ngobeni, H. Venter and I. Burke, A forensic readiness model for wireless networks, in Advances in Digital Forensics VI, K. Chow and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 107\u2013117, 2010."},{"key":"3_CR32","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-642-15506-2_14","volume-title":"Advances in Digital Forensics VI","author":"J. Okolica","year":"2010","unstructured":"J. Okolica and G. Peterson, A compiled memory analysis tool, in Advances in Digital Forensics VI, K. Chow and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 195\u2013204, 2010."},{"key":"3_CR33","first-page":"17","volume-title":"Advances in Digital Forensics","author":"M. Olivier","year":"2005","unstructured":"M. Olivier, Forensics and privacy-enhancing technologies, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 17\u201331, 2005."},{"key":"3_CR34","first-page":"283","volume-title":"Advances in Digital Forensics","author":"L. Peng","year":"2005","unstructured":"L. Peng, T. Wingfield, D. Wijsekera, E. Frye, R. Jackson and J. Michael, Making decisions about legal responses to cyber attacks, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 283\u2013294, 2005."},{"key":"3_CR35","first-page":"79","volume-title":"Advances in Digital Forensics","author":"A. Persaud","year":"2005","unstructured":"A. Persaud and Y. Guan, A framework for email investigations, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 79\u201390, 2005."},{"key":"3_CR36","first-page":"259","volume-title":"Advances in Digital Forensics","author":"G. Peterson","year":"2005","unstructured":"G. Peterson, Forensic analysis of digital image tampering, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 259\u2013270, 2005."},{"key":"3_CR37","first-page":"245","volume-title":"Advances in Digital Forensics","author":"S. Piper","year":"2005","unstructured":"S. Piper, M. Davis, G. Manes and S. Shenoi, Detecting hidden data in ext2\/ext3 file systems, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 245\u2013256, 2005."},{"key":"3_CR38","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-642-15506-2_1","volume-title":"Advances in Digital Forensics VI","author":"M. Pollitt","year":"2010","unstructured":"M. Pollitt, A history of digital forensics, in Advances in Digital Forensics VI, K. Chow and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 3\u201315, 2010."},{"key":"3_CR39","doi-asserted-by":"crossref","DOI":"10.1007\/0-387-31163-7","volume-title":"Advances in Digital Forensics","author":"M. Pollitt","year":"2005","unstructured":"M. Pollitt and S. Shenoi, Advances in Digital Forensics, Springer, Boston, Massachusetts, 2005."},{"key":"3_CR40","first-page":"141","volume-title":"Advances in Digital Forensics","author":"S. Redding","year":"2005","unstructured":"S. Redding, Using peer-to-peer technology for network forensics, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 141\u2013152, 2005."},{"key":"3_CR41","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-642-15506-2_15","volume-title":"Advances in Digital Forensics VI","author":"V. Roussev","year":"2010","unstructured":"V. Roussev, Data fingerprinting with similarity digests, in Advances in Digital Forensics VI, K. Chow and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 207\u2013226, 2010."},{"key":"3_CR42","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-642-15506-2_12","volume-title":"Advances in Digital Forensics VI","author":"A. Savoldi","year":"2010","unstructured":"A. Savoldi, P. Gubian and I. Echizen, Uncertainty in live forensics, in Advances in Digital Forensics VI, K. Chow and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 171\u2013184, 2010."},{"key":"3_CR43","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-642-15506-2_16","volume-title":"Advances in Digital Forensics VI","author":"B. Schatz","year":"2010","unstructured":"B. Schatz and M. Cohen, Redefining evidence containers for provenance and accurate data representation, in Advances in Digital Forensics VI, K. Chow and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 227\u2013242, 2010."},{"key":"3_CR44","first-page":"127","volume-title":"Advances in Digital Forensics","author":"K. Shanmugasundaram","year":"2005","unstructured":"K. Shanmugasundaram, H. Bronnimann and N. Memon, Integrating digital forensics in network infrastructures, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 127\u2013140, 2005."},{"key":"3_CR45","first-page":"656","volume-title":"Proceedings of the Twenty-Third International Conference on Software Engineering","author":"M. Shaw","year":"2001","unstructured":"M. Shaw, The coming-of-age of software architecture research, Proceedings of the Twenty-Third International Conference on Software Engineering, pp. 656\u2013664, 2001."},{"key":"3_CR46","first-page":"295","volume-title":"Advances in Digital Forensics","author":"J. Slay","year":"2005","unstructured":"J. Slay and K. Jorgensen, Applying filter clusters to reduce search state space, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 295\u2013301, 2005."},{"issue":"5","key":"3_CR47","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/s002870050105","volume":"21","author":"G. Snelting","year":"1998","unstructured":"G. Snelting, Paul Feyerabend und die Softwaretechnologie, Informatik Spektrum, vol. 21(5), pp. 273\u2013276, 1998.","journal-title":"Informatik Spektrum"},{"key":"3_CR48","first-page":"205","volume-title":"Advances in Digital Forensics","author":"C. Swenson","year":"2005","unstructured":"C. Swenson, G. Manes and S. Shenoi, Imaging and analysis of GSM SIM cards, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 205\u2013216, 2005."},{"key":"3_CR49","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-3-642-15506-2_18","volume-title":"Advances in Digital Forensics VI","author":"K. Tadano","year":"2010","unstructured":"K. Tadano, M. Kawato, R. Furukawa, F. Machida and Y. Maeno, Digital watermarking of virtual machine images, in Advances in Digital Forensics VI, K. Chow and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 257\u2013268, 2010."},{"key":"3_CR50","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-642-15506-2_17","volume-title":"Advances in Digital Forensics VI","author":"V. Thing","year":"2010","unstructured":"V. Thing, Virtual expansion of rainbow tables, in Advances in Digital Forensics VI, K. Chow and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 243\u2013256, 2010."},{"key":"3_CR51","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-642-15506-2_3","volume-title":"Advances in Digital Forensics VI","author":"K. Wang","year":"2010","unstructured":"K. Wang, Using a local search warrant to acquire evidence stored overseas via the Internet, in Advances in Digital Forensics VI, K. Chow and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 37\u201348, 2010."},{"key":"3_CR52","first-page":"191","volume-title":"Advances in Digital Forensics","author":"S. Willassen","year":"2005","unstructured":"S. Willassen, Forensic analysis of mobile phone internal memory, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 191\u2013204, 2005."},{"key":"3_CR53","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-642-15506-2_20","volume-title":"Advances in Digital Forensics VI","author":"Y. Yang","year":"2010","unstructured":"Y. Yang, K. Chow, L. Hui, C. Wang, L. Chen, Z. Chen and J. Chen, Forensic analysis of popular Chinese Internet applications, in Advances in Digital Forensics VI, K. Chow and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 285\u2013295, 2010."},{"key":"3_CR54","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-642-15506-2_6","volume-title":"Advances in Digital Forensics VI","author":"Y. Zhu","year":"2010","unstructured":"Y. Zhu, J. James and P. Gladyshev, A consistency study of the Windows registry, in Advances in Digital Forensics VI, K. Chow and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 77\u201390, 2010."}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics IX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41148-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,5]],"date-time":"2020-08-05T16:14:16Z","timestamp":1596644056000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41148-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642411472","9783642411489"],"references-count":54,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41148-9_3","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2013]]}}}