iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/IMF.2011.11
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:23:33Z","timestamp":1729617813610,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,5]]},"DOI":"10.1109\/imf.2011.11","type":"proceedings-article","created":{"date-parts":[[2011,6,29]],"date-time":"2011-06-29T11:23:16Z","timestamp":1309346596000},"page":"92-106","source":"Crossref","is-referenced-by-count":3,"title":["A Common Scheme for Evaluation of Forensic Software"],"prefix":"10.1109","author":[{"given":"Mario","family":"Hildebrandt","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Kiltz","sequence":"additional","affiliation":[]},{"given":"Jana","family":"Dittmann","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"EnCase Legal Journal","year":"2009","key":"ref10"},{"journal-title":"EnCase Forensic - Digital Data Collection & Analysis Application Guidance Software","year":"2011","key":"ref11"},{"journal-title":"Breaking Forensics Software Weaknesses in Critical Evidence Collection","year":"2007","author":"newsham","key":"ref12"},{"journal-title":"Anti-Forensics Techniques Detection and Countermeasures","year":"2007","author":"garfinkel","key":"ref13"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1007\/BFb0028165","article-title":"Low cost attacks on tamper resistant devices","volume":"1361","author":"anderson","year":"1998","journal-title":"Security Protocols Ser Lecture Notes in Computer Science"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.2172\/751004"},{"journal-title":"Computer Security Art and Science","year":"2003","author":"bishop","key":"ref16"},{"journal-title":"Transitions Recommendation for Transitioning the use of Cryptographic Algorithms and Key Lengths","year":"2011","author":"barker","key":"ref17","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-131a"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.4018\/jdcf.2009010101"},{"journal-title":"Open Source Digital Forensics Tools The Legal Argument","year":"2002","author":"carrier","key":"ref19"},{"key":"ref4","first-page":"1619","article-title":"Video surveillance: A new forensic model for the forensically sound retrival of picture content off a memory dump","author":"kiltz","year":"2009","journal-title":"Proceedings of Informatik2009 - Digitale Multimedia-Forensik"},{"year":"2005","key":"ref3"},{"journal-title":"Federal Rules of Evidence 2011","year":"2011","key":"ref6"},{"year":"2001","author":"dixon","key":"ref5"},{"journal-title":"SWGDE Recommended Guidelines for Validation Testing Version 1 1","year":"2009","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2009.06.015"},{"journal-title":"Funktionale Sicherheit-Integraler Bestandteil der Betriebssicherheit Schutzeinrichtungen nach IEC 61508\/61511 Funktionale Sicherheit und SIL","year":"2007","author":"klotz-engmann","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1117\/12.872362"},{"journal-title":"Common Criteria for Information Technology Security Evaluation","year":"2009","key":"ref9"},{"journal-title":"NIJ Special Report Test Results for Disk Imaging Tools dd GNU fileutils 4 0 36 Provided with Red Hat Linux 7 1","year":"2002","key":"ref20"},{"journal-title":"NIJ Special Report Test Results for Digital Data Acquisition Tool EnCase 6 5","year":"2009","key":"ref22"},{"journal-title":"Quirks Uncovered While Testing Forensic Tool","year":"2008","author":"lyle","key":"ref21"},{"journal-title":"Collisions for hash functions Md 4 md 5 haval-128 and ripemd","year":"2004","author":"wang","key":"ref24"},{"journal-title":"The Official EnCE EnCase® Certified Examiner Study Guide","year":"2006","author":"bunting","key":"ref23"}],"event":{"name":"2011 6th International Conference on IT Security Incident Management and IT Forensics (IMF 2011)","start":{"date-parts":[[2011,5,10]]},"location":"Stuttgart, Germany","end":{"date-parts":[[2011,5,12]]}},"container-title":["2011 Sixth International Conference on IT Security Incident Management and IT Forensics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5931035\/5931097\/05931115.pdf?arnumber=5931115","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T10:16:11Z","timestamp":1560334571000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5931115\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5]]},"references-count":24,"URL":"http:\/\/dx.doi.org\/10.1109\/imf.2011.11","relation":{},"subject":[],"published":{"date-parts":[[2011,5]]}}}