{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,22]],"date-time":"2024-09-22T04:16:45Z","timestamp":1726978605629},"reference-count":0,"publisher":"ACM","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.4108\/e-forensics.2008.2852","type":"proceedings-article","created":{"date-parts":[[2012,3,15]],"date-time":"2012-03-15T08:54:07Z","timestamp":1331801647000},"source":"Crossref","is-referenced-by-count":2,"title":["Voice over IP Forensics."],"prefix":"10.4108","author":[{"given":"Jill","family":"Slay","sequence":"first","affiliation":[]},{"given":"Matthew","family":"Simon","sequence":"additional","affiliation":[]}],"member":"2587","event":{"number":"1","sponsor":["ICST"],"acronym":"E-FORENSICS","name":"1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia","start":{"date-parts":[[2008,1,21]]},"location":"Adelaide, Australia","end":{"date-parts":[[2008,1,23]]}},"container-title":["Proceedings of the 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia"],"original-title":[],"deposited":{"date-parts":[[2024,9,21]],"date-time":"2024-09-21T16:15:23Z","timestamp":1726935323000},"score":1,"resource":{"primary":{"URL":"http:\/\/eudl.eu\/doi\/10.4108\/e-forensics.2008.2852"}},"subtitle":[],"proceedings-subject":"Forensic Applications and Techniques in Telecommunications, Information and Multimedia","short-title":[],"issued":{"date-parts":[[2008]]},"references-count":0,"URL":"https:\/\/doi.org\/10.4108\/e-forensics.2008.2852","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}