{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T00:54:27Z","timestamp":1725670467215},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","funder":[{"DOI":"10.13039\/100000138","name":"U.S. Department of Education","doi-asserted-by":"publisher","award":["P120A080094P120A090122"],"id":[{"id":"10.13039\/100000138","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,3,24]]},"DOI":"10.1145\/2016039.2016088","type":"proceedings-article","created":{"date-parts":[[2011,8,10]],"date-time":"2011-08-10T16:16:32Z","timestamp":1312992992000},"page":"179-184","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["A framework for designing benchmarks of investigating digital forensics tools for mobile devices"],"prefix":"10.1145","author":[{"given":"Maynard","family":"Yates","sequence":"first","affiliation":[{"name":"Florida Agricultural and Mechanical University, Tallahassee, FL"}]},{"given":"Hongmei","family":"Chi","sequence":"additional","affiliation":[{"name":"Florida Agricultural and Mechanical University, Tallahassee, FL"}]}],"member":"320","published-online":{"date-parts":[[2011,3,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Retrieved","author":"AccessData","year":"2010","unstructured":"AccessData . (n.d.). Mobile Phone Examiner . Retrieved May 15, 2010 , from AccessData : http:\/\/www.accessdata.com\/mobilephoneexaminer.html AccessData. (n.d.). Mobile Phone Examiner. Retrieved May 15, 2010, from AccessData: http:\/\/www.accessdata.com\/mobilephoneexaminer.html"},{"key":"e_1_3_2_1_2_1","volume-title":"The Rules of Digital Evidence and AccessData Technology. Retrieved","author":"AccessData","year":"2010","unstructured":"AccessData . (n.d.). The Rules of Digital Evidence and AccessData Technology. Retrieved May 10, 2010 , from AccessData Corporation : http:\/\/accessdata.com\/downloads\/media\/Rules_of_Digital_Evidence_and_AccessData_Technology.pdf AccessData. (n.d.). The Rules of Digital Evidence and AccessData Technology. Retrieved May 10, 2010, from AccessData Corporation: http:\/\/accessdata.com\/downloads\/media\/Rules_of_Digital_Evidence_and_AccessData_Technology.pdf"},{"key":"e_1_3_2_1_3_1","volume-title":"International Journal of Digital Crime and Forensics.","author":"Curran K. R.","year":"2010","unstructured":"Curran , K. R. ( 2010 ). Mobile Phone Forensic Analysis . International Journal of Digital Crime and Forensics. Curran, K. R. (2010). Mobile Phone Forensic Analysis. International Journal of Digital Crime and Forensics."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774427"},{"key":"e_1_3_2_1_5_1","unstructured":"Guidance Software. (n.d.). EnCase Neutrino. Retrieved May 28 2010 from Guidance Software: http:\/\/www.guidancesoftware.com\/product.aspx?B=Product&Product_S=AccordianTwo&menu_id=117&id=348&terms=mobile+devices Guidance Software. (n.d.). EnCase Neutrino . Retrieved May 28 2010 from Guidance Software: http:\/\/www.guidancesoftware.com\/product.aspx?B=Product&Product_S=AccordianTwo&menu_id=117&id=348&terms=mobile+devices"},{"key":"e_1_3_2_1_6_1","unstructured":"Jansen W. & Delaitre A. (n.d.). Mobile Forensic Reference Materials: A Methodoloy and Reification. Retrieved from National Institute of Standards and Technology: http:\/\/csrc.nist.gov\/publications\/nistir\/ir7617\/nistir-7617.pdf Jansen W. & Delaitre A. (n.d.). Mobile Forensic Reference Materials: A Methodoloy and Reification . Retrieved from National Institute of Standards and Technology: http:\/\/csrc.nist.gov\/publications\/nistir\/ir7617\/nistir-7617.pdf"},{"key":"e_1_3_2_1_7_1","volume-title":"Windows Mobile Advanced Forensics","author":"Klaver C.","year":"2010","unstructured":"Klaver , C. ( 2010 ). Windows Mobile Advanced Forensics . Elsevier . Klaver, C. (2010). Windows Mobile Advanced Forensics. Elsevier."},{"key":"e_1_3_2_1_8_1","volume-title":"Android Forensics: Simplifying Cell Phone Examinations. Small Scale Digital Device Forensics Journal","author":"Lessard J.","year":"2010","unstructured":"Lessard , J. , & Kessler , G. C. ( 2010 ). Android Forensics: Simplifying Cell Phone Examinations. Small Scale Digital Device Forensics Journal . Lessard, J., & Kessler, G. C. (2010). Android Forensics: Simplifying Cell Phone Examinations. Small Scale Digital Device Forensics Journal."},{"key":"e_1_3_2_1_9_1","volume-title":"Mobile Device Analysis. Small Scale Digital Device Forensics Journal","author":"Mislan R.","year":"2008","unstructured":"Mislan , R. ( 2008 ). Mobile Device Analysis. Small Scale Digital Device Forensics Journal . Mislan, R. (2008). Mobile Device Analysis. Small Scale Digital Device Forensics Journal."},{"key":"e_1_3_2_1_10_1","volume-title":"Computer Forensic Timeline visualization tool","author":"Olsson J.","year":"2009","unstructured":"Olsson , J. , & Martin , B. ( 2009 ). Computer Forensic Timeline visualization tool . Elsevier , S78--S87. Olsson, J., & Martin, B. (2009). Computer Forensic Timeline visualization tool. Elsevier, S78--S87."},{"key":"e_1_3_2_1_11_1","volume-title":"Retrieved","author":"Oxygen Forensic","year":"2010","unstructured":"Oxygen Forensic . (n.d.). Oxygen Forensic Suite 2010 . Retrieved May 15, 2010 , from Oxygen Forensic : http:\/\/www.oxygen-forensic.com Oxygen Forensic. (n.d.). Oxygen Forensic Suite 2010. Retrieved May 15, 2010, from Oxygen Forensic: http:\/\/www.oxygen-forensic.com"},{"key":"e_1_3_2_1_12_1","volume-title":"Device Seizure. Retrieved","author":"Paraben Corporation","year":"2010","unstructured":"Paraben Corporation . (n.d.). Device Seizure. Retrieved May 29, 2010 , from Paraben Corporation : http:\/\/www.paraben-forensics.com\/device-seizure.html Paraben Corporation. (n.d.). Device Seizure. Retrieved May 29, 2010, from Paraben Corporation: http:\/\/www.paraben-forensics.com\/device-seizure.html"},{"key":"e_1_3_2_1_13_1","volume-title":"Prodeedings of the 5th Australian Digital Forensics Conference (pp. 34--51)","author":"Sansurooah K.","year":"2007","unstructured":"Sansurooah , K. ( 2007 ). An overview and examination of digital PDA devices under forensics toolkits . Prodeedings of the 5th Australian Digital Forensics Conference (pp. 34--51) . Perth, Western Australia : School of Computer and Information Science, Edith Cowan University. Sansurooah, K. (2007). An overview and examination of digital PDA devices under forensics toolkits. Prodeedings of the 5th Australian Digital Forensics Conference (pp. 34--51). Perth, Western Australia: School of Computer and Information Science, Edith Cowan University."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2009.314"}],"event":{"name":"ACM SE '11: ACM Southeast Regional Conference","sponsor":["ACM Association for Computing Machinery"],"location":"Kennesaw Georgia","acronym":"ACM SE '11"},"container-title":["Proceedings of the 49th Annual Southeast Regional Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2016039.2016088","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T06:39:16Z","timestamp":1672987156000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2016039.2016088"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3,24]]},"references-count":14,"alternative-id":["10.1145\/2016039.2016088","10.1145\/2016039"],"URL":"https:\/\/doi.org\/10.1145\/2016039.2016088","relation":{},"subject":[],"published":{"date-parts":[[2011,3,24]]},"assertion":[{"value":"2011-03-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}