{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T06:24:26Z","timestamp":1725776666249},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,14]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361430","type":"proceedings-article","created":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T19:38:38Z","timestamp":1703533118000},"page":"0956-0962","source":"Crossref","is-referenced-by-count":1,"title":["File Fragment Analysis Using Machine Learning"],"prefix":"10.1109","author":[{"given":"Razaq","family":"Jinad","sequence":"first","affiliation":[{"name":"Sam Houston State University,Dept. of Computer Science,Huntsville,Texas,USA"}]},{"given":"ABM","family":"Islam","sequence":"additional","affiliation":[{"name":"Sam Houston State University,Dept. of Computer Science,Huntsville,Texas,USA"}]},{"given":"Narasimha","family":"Shashidhar","sequence":"additional","affiliation":[{"name":"Sam Houston State University,Dept. of Computer Science,Huntsville,Texas,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/make2030012"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.553"},{"journal-title":"ACM CCS WORM","article-title":"Fileprint analysis for malware detection","year":"2005","author":"Salvatore","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.23919\/MIPRO.2019.8756878"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2008.4625611"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC.2014.6975930"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00029"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.05.008"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2021.301121"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2009.06.016"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.4103\/0256-4602.67149"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495935"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SADFE.2009.21"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2006.1652088"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2003.1174905"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-33406-8_35"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2010.05.004"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2013.06.008"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2011.135"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2007.75"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.2307\/2288805"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/BF02589501"},{"volume-title":"Raster bands. raster bands-ArcGIS Pro - documentation","year":"2023","key":"ref23"}],"event":{"name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","start":{"date-parts":[[2023,11,14]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2023,11,17]]}},"container-title":["2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10361260\/10360496\/10361430.pdf?arnumber=10361430","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T20:44:57Z","timestamp":1705092297000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10361430\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,14]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361430","relation":{},"subject":[],"published":{"date-parts":[[2023,11,14]]}}}