{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T23:27:21Z","timestamp":1725751641331},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642411472"},{"type":"electronic","value":"9783642411489"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41148-9_8","type":"book-chapter","created":{"date-parts":[[2013,10,9]],"date-time":"2013-10-09T14:47:31Z","timestamp":1381330051000},"page":"119-134","source":"Crossref","is-referenced-by-count":0,"title":["Hash-Based File Content Identification Using Distributed Systems"],"prefix":"10.1007","author":[{"given":"York","family":"Yannikos","sequence":"first","affiliation":[]},{"given":"Jonathan","family":"Schluessler","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Steinebach","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Winter","sequence":"additional","affiliation":[]},{"given":"Kalman","family":"Graffi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"S","key":"8_CR1","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.diin.2007.06.016","volume":"4","author":"F. Adelstein","year":"2007","unstructured":"F. Adelstein and R. Joyce, File Marshal: Automatic extraction of peer-to-peer data, Digital Investigation, vol. 4(S), pp. S43\u2013S48, 2007.","journal-title":"Digital Investigation"},{"key":"8_CR2","unstructured":"BitTorrent, BitTorrent and \u03bcTorrent software surpass 150 million user milestone; announce new consumer electronics partnerships, Press Release, San Francisco, California (\n \n www.bittorrent.com\/intl\/es\/company\/about\/ces_2012_150m_users\n \n \n ), January 9, 2012."},{"key":"8_CR3","unstructured":"Cisco Systems, Cisco Visual Networking Index: Forecast and Methodology, White Paper, San Jose, California (\n \n www.cisco.com\/en\/US\/solutions\/collateral\/ns341\/ns525\/ns537\/ns705\/ns827\/white_paper_c11-481360.pdf\n \n \n ), 2012."},{"key":"8_CR4","volume-title":"Proceedings of the First International Workshop on the Economics of Peer-to-Peer Systems","author":"B. Cohen","year":"2003","unstructured":"B. Cohen, Incentives build robustness in BitTorrent, Proceedings of the First International Workshop on the Economics of Peer-to-Peer Systems, 2003."},{"key":"8_CR5","unstructured":"Dev-Host, The ultimate free file hosting\/file sharing service, Los Angeles, California (\n \n d-h.st\n \n \n )."},{"key":"8_CR6","unstructured":"eMule-MODs.de, Server List for eDonkey and eMule (\n \n www.emule-mods.de\/?servermet=show\n \n \n )."},{"key":"8_CR7","unstructured":"Escape Media Group, Grooveshark, Gainesville, Florida (\n \n www.grooveshark.com\n \n \n )."},{"key":"8_CR8","unstructured":"IMDb.com, Internet Movie Database, Seattle, Washington (\n \n www.imdb.com\n \n \n )."},{"key":"8_CR9","unstructured":"Kuiper Forensics, PeerLab \u2013 Scanning and evaluation of P2P applications, Mainz, Germany (\n \n www.kuiper.de\/index.php\/en\/peerlab\n \n \n )."},{"key":"8_CR10","unstructured":"Y. Kulbak and D. Bickson, The eMule Protocol Specification, Technical Report, School of Computer Science and Engineering, Hebrew University of Jerusalem, Jerusalem, Israel, 2005."},{"key":"8_CR11","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-45748-8_5","volume-title":"Proceedings of the First International Workshop on Peer-to-Peer Systems","author":"P. Maymounkov","year":"2002","unstructured":"P. Maymounkov and D. Mazieres, Kademlia: A peer-to-peer information system based on the XOR metric, Proceedings of the First International Workshop on Peer-to-Peer Systems, pp. 53\u201365, 2002."},{"key":"8_CR12","unstructured":"National Institute of Standards and Technology, National Software Reference Library, Gaithersburg, Maryland (\n \n www.nsrl.nist.gov\n \n \n )."},{"key":"8_CR13","unstructured":"Net Applications, Desktop Search Engine Market Share (\n \n www.netmarketshare.com\/search-engine-market-share.aspx?qprd=4&qpcustomd=0\n \n \n ), October 2012."},{"key":"8_CR14","unstructured":"SANS Internet Storm Center, Hash Database, SANS Institute, Bethesda, Maryland (\n \n isc.sans.edu\/tools\/hashsearch.html\n \n \n )."},{"key":"8_CR15","unstructured":"H. Schulze and K. Mochalski, Internet Study 2008\/2009, ipoque, Leipzig, Germany (\n \n www.ipoque.com\/sites\/default\/files\/mediafiles\/documents\/internet-study-2008-2009.pdf\n \n \n ), 2009."},{"key":"8_CR16","volume-title":"Proceedings of the SPIE Conference on Media Watermarking, Security and Forensics","author":"M. Steinebach","year":"2012","unstructured":"M. Steinebach, H. Liu and Y. Yannikos, Forbild: Efficient robust image hashing, Proceedings of the SPIE Conference on Media Watermarking, Security and Forensics, vol. 8303, 2012."},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1145\/1298306.1298323","volume-title":"Proceedings of the Seventh ACM SIGCOMM Conference on Internet Measurement","author":"M. Steiner","year":"2007","unstructured":"M. Steiner, T. En-Najjary and E. Biersack, A global view of kad, Proceedings of the Seventh ACM SIGCOMM Conference on Internet Measurement, pp. 117\u2013122, 2007."},{"key":"8_CR18","unstructured":"Team Cymru, Malware Hash Registry (MHR), Lake Mary, Florida (\n \n www.team-cymru.org\/Services\/MHR\n \n \n )."},{"key":"8_CR19","unstructured":"VirusTotal Team, VirusTotal, Malaga, Spain (\n \n www.virustotal.com\n \n \n )."},{"key":"8_CR20","unstructured":"Yahoo! Flickr, Sunnyvale, California (\n \n www.flickr.com\n \n \n )."}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics IX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41148-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T15:54:30Z","timestamp":1558108470000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41148-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642411472","9783642411489"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41148-9_8","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2013]]}}}