{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T11:26:09Z","timestamp":1745321169508,"version":"3.28.0"},"reference-count":80,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/ares.2013.62","type":"proceedings-article","created":{"date-parts":[[2013,11,11]],"date-time":"2013-11-11T22:22:24Z","timestamp":1384208544000},"page":"475-484","source":"Crossref","is-referenced-by-count":23,"title":["A Comprehensive Literature Review of File Carving"],"prefix":"10.1109","author":[{"given":"Rainer","family":"Poisel","sequence":"first","affiliation":[]},{"given":"Simon","family":"Tjoa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"79","first-page":"1","article-title":"An ontological approach for digital evidence search","volume":"2","author":"kota","year":"2012","journal-title":"International Journal of Scientific and Research Publications"},{"key":"78","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2010.5593235"},{"key":"77","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2009.5137303"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774431"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2010.05.003"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2010.100"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.52"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2010.05.002"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1080\/15567280802050436"},{"journal-title":"A Visual Study of Primitive Binary Fragment Types","year":"2010","author":"conti","key":"38"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33962-2_5"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2008.4625611"},{"key":"41","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/978-3-642-24212-0_5","article-title":"Fast contentbased file type identification","volume":"361","author":"ahmed","year":"2011","journal-title":"IFIP Int Conf Digital Forensics Ser IFIP Advances in Information and Communication Technology"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/SADFE.2009.21"},{"key":"80","article-title":"Constructing bayesian networks automatically using ontologies","author":"devitt","year":"2006","journal-title":"Proceedings of Second Workshop on Formal Ontologies Meets Industry (FOMI 2006)"},{"key":"67","first-page":"107","article-title":"Mcarve: Carving attributed dump sets","author":"van deursen","year":"2011","journal-title":"Proc Usenix Security Symposium"},{"key":"66","article-title":"Dimsum: Discovering semantic data of interest from un-mappable memory with confidence","author":"lin","year":"2012","journal-title":"Proceedings of the ISOC'95 Symposium on Network and Distributed System Security"},{"key":"69","first-page":"34","article-title":"Domain-specific languages for better forensic software","volume":"90","author":"bos den j van","year":"2012","journal-title":"Cybercrime"},{"key":"68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30476-7_8"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2007.06.017"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2009.5386487"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/IWSCN.2010.5497996"},{"journal-title":"The Structure of the Reiser File System Retrieved Ferbruary 7th 2013","year":"2006","author":"buchholz","key":"25"},{"key":"26","first-page":"64","article-title":"Fileprints: Identifying file types by n-gram analysis","author":"li","year":"2005","journal-title":"Proc of the Sixth Systems Man and Cybernetics Information Assurance Workshop (IAW'05)"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2003.1174905"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-33406-8_35"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2008.05.005"},{"year":"0","key":"3"},{"year":"0","key":"2"},{"year":"0","key":"1"},{"year":"0","key":"7"},{"key":"30","first-page":"41","author":"moody","year":"2008","journal-title":"Sadi-Statistical Analysis for Data Type Identification"},{"year":"0","key":"6"},{"journal-title":"Crime On-Line Correlates Causes and Context","year":"2010","author":"holt","key":"5"},{"journal-title":"Completing the Picture -Fragments and Back Again","year":"2013","author":"karresand","key":"32"},{"journal-title":"The Control Revolution Technological and Economic Origins of the Information Society","year":"1989","author":"beniger","key":"4"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2007.75"},{"journal-title":"Ontology Development 101 A Guide to Creating Your First Ontology Retrieved January 22nd 2013","year":"2001","author":"noy","key":"70"},{"key":"71","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2010.01.003"},{"year":"0","key":"9"},{"key":"72","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0757-7_4"},{"year":"0","key":"8"},{"journal-title":"Measuring and Improving the Quality of File Carving Methods","year":"2007","author":"kloet","key":"73"},{"key":"74","doi-asserted-by":"publisher","DOI":"10.1109\/IMF.2009.8"},{"key":"75","doi-asserted-by":"publisher","DOI":"10.1109\/IMF.2011.14"},{"key":"76","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2010.05.009"},{"journal-title":"Semantic File Carving","year":"2011","author":"schmittner","key":"59"},{"journal-title":"Automatic Reassembly of Document Fragments Via Data Compression","year":"2002","author":"shanmugasundaram","key":"58"},{"key":"57","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2003.1254320"},{"journal-title":"Reconstructing Compressed Photo and Video Data","year":"2012","author":"lewis","key":"56"},{"journal-title":"The Sleuth Kit","year":"2013","author":"carrier","key":"19"},{"journal-title":"Forensic Reconstruction of Fragmented Variable Bitrate MP3 Files","year":"2010","author":"sajja","key":"55"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.118"},{"journal-title":"Advances in File Carving","year":"2011","author":"zirnstein","key":"18"},{"year":"0","key":"15"},{"journal-title":"Planning Page Retrieved February 6th 2013","year":"2012","author":"wiki","key":"16"},{"key":"13","first-page":"1","article-title":"Scalpel: A frugal, high performance file carver","author":"richard","year":"2005","journal-title":"Proc of the Fifth Annual DFRWS Conference"},{"journal-title":"Digital Forensics Research Conf (DFRWS) DFRWS 2006 Forensics Challenge","year":"2006","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.931081"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2008.05.015"},{"journal-title":"Pytsk-Python Bindings for the Sleuthkit Retrieved Ferbruary 7th 2013","year":"2012","author":"cohen","key":"21"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/SADFE.2009.12"},{"key":"64","doi-asserted-by":"publisher","DOI":"10.1109\/SADFE.2011.5"},{"key":"65","article-title":"Siggraph: Brute force scanning of kernel data structure instances using graph-based signatures","author":"lin","year":"2011","journal-title":"Proc of the 18th Annual Network and Distributed System Symposium the Internet Society"},{"key":"62","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.05.014"},{"key":"63","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774426"},{"journal-title":"DFRWS Forensic Carving Challenge Retrieved February 7th 2013","year":"2006","author":"metz","key":"60"},{"year":"0","key":"61"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2003.1220995"},{"key":"48","first-page":"671","article-title":"Bringing domainspecific languages to digital forensics","author":"bos den j van","year":"2011","journal-title":"Proc of the 21st Int Conf on Software Engineering (ICSE)"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2007.10.001"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-73742-3_15"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2011.68"},{"key":"46","first-page":"161","article-title":"Advanced jpeg carving","author":"cohen","year":"2008","journal-title":"Proc of the 1st International Conference on Forensic Applications and Techniques in Telecommunications Information and Multimedia and Workshop Ser E-Forensics '08 ICST Brussels Belgium Belgium ICST (Institute for Computer Sciences Social-Informatics and Telecommunications Engineering)"},{"journal-title":"File System Forensic Analysis","year":"2005","author":"carrier","key":"10"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2011.180"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23602-0_3"},{"key":"53","first-page":"42","article-title":"Advanced file carving approaches for multimedia files","volume":"2","author":"poisel","year":"2011","journal-title":"Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications (JoWUA)"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2009.06.007"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.863054"}],"event":{"name":"2013 Eighth International Conference on Availability, Reliability and Security (ARES)","start":{"date-parts":[[2013,9,2]]},"location":"Regensburg, Germany","end":{"date-parts":[[2013,9,6]]}},"container-title":["2013 International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6656131\/6657192\/06657278.pdf?arnumber=6657278","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T01:45:58Z","timestamp":1498095958000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6657278\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":80,"URL":"https:\/\/doi.org\/10.1109\/ares.2013.62","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}