{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:25:25Z","timestamp":1730273125002,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/ised48680.2019.9096232","type":"proceedings-article","created":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T21:05:06Z","timestamp":1589922306000},"page":"1-5","source":"Crossref","is-referenced-by-count":3,"title":["A SMART Goal-based Framework for Privacy Preserving Embedded Forensic Investigations"],"prefix":"10.1109","author":[{"given":"Jayant","family":"Pathak","sequence":"first","affiliation":[]},{"given":"Sriram","family":"Sankaran","sequence":"additional","affiliation":[]},{"given":"Krishnashree","family":"Achuthan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Security and privacy vs computer forensics capabilities","year":"2007","author":"s","key":"ref33"},{"journal-title":"Security and privacy in the computer forensics context","first-page":"1","year":"2006","author":"srinivasan","key":"ref32"},{"journal-title":"Security or privacy must we choose?","year":"2019","author":"desmedt","key":"ref31"},{"journal-title":"Issues in Computer Forensics","year":"2019","author":"bui","key":"ref30"},{"year":"0","key":"ref37"},{"year":"0","key":"ref36"},{"year":"0","key":"ref35"},{"journal-title":"2011 International Conference for Internet Technology and Secured Transactions ICITST 2011","article-title":"Quaternary privacy-levels preservation in computer forensics investigation process","year":"2011","author":"halboob","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2007.10.008"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1349026.1349030"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.01.002"},{"journal-title":"Counter-Forensic Privacy Tools - A Forensic Evaluation","year":"2019","author":"geiger","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IIHMSP.2011.28"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SADFE.2011.15"},{"journal-title":"Proceedings of SADFE","article-title":"Protecting digital data privacy in computer forensic examination","year":"2011","author":"chow","key":"ref16"},{"journal-title":"A privacy-preserving approach for collecting evidence in forensic investigation","year":"2013","author":"hou","key":"ref17"},{"journal-title":"Privacy preserving multiple keyword search for confidential investigation of remote forensics","year":"2011","author":"hou","key":"ref18"},{"journal-title":"Sequenced release of privacy accurate call data record information in a gsm forensic investigation","first-page":"1","year":"2006","author":"croft","key":"ref19"},{"journal-title":"Collecting digital evidence of cyber crime","year":"2006","author":"saboohi","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2007.06.006"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.08.246"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.2.3.1-11"},{"key":"ref6","first-page":"185","volume":"4237","author":"dimitris","year":"2006","journal-title":"Ppina - a forensic investigation protocol for privacy enhancing technologies"},{"journal-title":"Legal issues pertaining to the development of digital forensic tools","first-page":"123","year":"2008","author":"adams","key":"ref29"},{"key":"ref5","first-page":"143","volume":"306","author":"reddy","year":"2009","journal-title":"A forensic framework for handling information privacy incidents"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1219052"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(04)00077-6"},{"journal-title":"Current Challenges and Future Research Areas for Digital Forensic Investigation","year":"2016","author":"lillis","key":"ref2"},{"key":"ref9","article-title":"A ten step process for forensic readiness","volume":"2","author":"rowlingson","year":"2004","journal-title":"IJDET"},{"journal-title":"Challenges to digital forensics A survey of researchers and practitioners attitudes and opinions","first-page":"1","year":"2013","author":"fahdi","key":"ref1"},{"journal-title":"Privacy preserving confidential forensic investigation for shared or remote servers","first-page":"378","year":"2011","author":"hou","key":"ref20"},{"key":"ref22","first-page":"688","article-title":"Smartphone forensics: A case study with nokia e5–00 mobile phone","volume":"3","author":"dehghantanha","year":"2012","journal-title":"International Journal of Digital Information and Wireless Communications (IJDIWC)"},{"journal-title":"Framework of digital forensics for the samsung star series phone","year":"2011","author":"parvez","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSec.2012.6246116"},{"journal-title":"Volatile memory acquisition using backup for forensic investigation","first-page":"186","year":"2012","author":"norouzi","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.5120\/7831-1042"},{"key":"ref25","first-page":"114","volume":"62","author":"tzetzuen","year":"2012","journal-title":"Greening digital forensics Opportunities and challenges"}],"event":{"name":"2019 9th International Symposium on Embedded Computing and System Design (ISED)","start":{"date-parts":[[2019,12,13]]},"location":"Kollam, India","end":{"date-parts":[[2019,12,14]]}},"container-title":["2019 9th International Symposium on Embedded Computing and System Design (ISED)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9089148\/9096215\/09096232.pdf?arnumber=9096232","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T20:22:19Z","timestamp":1658262139000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9096232\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/ised48680.2019.9096232","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}