{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T16:45:25Z","timestamp":1732034725224,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/issa.2013.6641058","type":"proceedings-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T19:20:04Z","timestamp":1383074404000},"page":"1-8","source":"Crossref","is-referenced-by-count":32,"title":["Challenges to digital forensics: A survey of researchers & practitioners attitudes and opinions"],"prefix":"10.1109","author":[{"given":"M.","family":"Al Fahdi","sequence":"first","affiliation":[]},{"given":"N.L.","family":"Clarke","sequence":"additional","affiliation":[]},{"given":"S.M.","family":"Furnell","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"3","DOI":"10.1016\/j.cose.2004.01.003"},{"year":"0","journal-title":"FTK-Forensic Toolkit","key":"2"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1145\/1529282.1529471"},{"year":"0","journal-title":"EnCase Forensic v7","key":"1"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1016\/S0167-4048(03)00405-X"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1201\/9781420000115"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1145\/1113034.1113074"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1016\/j.diin.2010.05.009"},{"key":"9","first-page":"3","volume":"194","author":"beebe","year":"2005","journal-title":"Dealing with terabyte data sets in digital investigations Advances in Digital Forensics"},{"key":"8","article-title":"Significant features for network forensic analysis using artificial intelligence techniques","volume":"1","author":"mukkamala","year":"2003","journal-title":"International Journal of Digital Evidence"},{"key":"11","article-title":"Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis","author":"ruan","year":"0","journal-title":"Proceedings of the 6th Annual Conference of the ADFSL Conference on Digital Forensics"}],"event":{"name":"2013 Information Security for South Africa","start":{"date-parts":[[2013,8,14]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2013,8,16]]}},"container-title":["2013 Information Security for South Africa"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6621627\/6641027\/06641058.pdf?arnumber=6641058","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T19:21:10Z","timestamp":1490210470000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6641058\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/issa.2013.6641058","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}