{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:03Z","timestamp":1750306143607,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,9,4]],"date-time":"2017-09-04T00:00:00Z","timestamp":1504483200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Adaptive Security And Privacy","award":["ERC Advanced Grant 291652"],"award-info":[{"award-number":["ERC Advanced Grant 291652"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,9,4]]},"DOI":"10.1145\/3121252.3121255","type":"proceedings-article","created":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T19:28:24Z","timestamp":1501615704000},"page":"10-11","update-policy":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Snap forensics: a tradeoff between ephemeral intelligence and persistent evidence collection"],"prefix":"10.1145","author":[{"given":"Yijun","family":"Yu","sequence":"first","affiliation":[{"name":"Open University, UK"}]},{"given":"Thein Than","family":"Tun","sequence":"additional","affiliation":[{"name":"Open University, UK"}]}],"member":"320","published-online":{"date-parts":[[2017,9,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/REW.2016.034"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3023359"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.03.001"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2013.6636745"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.07.062"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Thein Tun Blaine Price Arosha Bandara Yijun Yu and Bashar Nuseibeh. 2016. Verifiable Limited Disclosure: Reporting and Handling Digital Evidence in Police Investigations. In iRENIC: 1st International Workshop on Requirements Engineering for Investigating and Countering Crime. https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/oro.open.ac.uk\/46914\/  Thein Tun Blaine Price Arosha Bandara Yijun Yu and Bashar Nuseibeh. 2016. Verifiable Limited Disclosure: Reporting and Handling Digital Evidence in Police Investigations. In iRENIC: 1st International Workshop on Requirements Engineering for Investigating and Countering Crime. https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/oro.open.ac.uk\/46914\/","DOI":"10.1109\/REW.2016.032"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-008-0042-8"},{"key":"e_1_3_2_1_8_1","unstructured":"Andy Weir. [n. d.]. UK rail network considers using iris and fingerprint scans as part of digital transformation. ([n. d.]).  Andy Weir. [n. d.]. UK rail network considers using iris and fingerprint scans as part of digital transformation. ([n. d.])."},{"key":"e_1_3_2_1_9_1"}],"event":{"name":"ESEC\/FSE'17: Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Paderborn Germany","acronym":"ESEC\/FSE'17"},"container-title":["Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics"],"original-title":[],"link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/3121252.3121255","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/dl.acm.org\/doi\/pdf\/10.1145\/3121252.3121255","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:39:24Z","timestamp":1750217964000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/3121252.3121255"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,4]]},"references-count":9,"alternative-id":["10.1145\/3121252.3121255","10.1145\/3121252"],"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1145\/3121252.3121255","relation":{},"subject":[],"published":{"date-parts":[[2017,9,4]]},"assertion":[{"value":"2017-09-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}