{"id":"https://openalex.org/W2906097199","doi":"https://doi.org/10.1109/bigdata.2018.8622550","title":"Identification of Attack-based Digital Forensic Evidences for WAMPAC Systems","display_name":"Identification of Attack-based Digital Forensic Evidences for WAMPAC Systems","publication_year":2018,"publication_date":"2018-12-01","ids":{"openalex":"https://openalex.org/W2906097199","doi":"https://doi.org/10.1109/bigdata.2018.8622550","mag":"2906097199"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata.2018.8622550","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata.2018.8622550","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101788003","display_name":"Asif Iqbal","orcid":"https://orcid.org/0000-0001-9726-9863"},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Asif Iqbal","raw_affiliation_strings":["School of Electrical Engineering & Computer Science, KTH Royal Institute of Technology, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering & Computer Science, KTH Royal Institute of Technology, Stockholm, Sweden","institution_ids":["https://openalex.org/I86987016"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062840800","display_name":"Farhan Mahmood","orcid":"https://orcid.org/0000-0003-3488-533X"},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Farhan Mahmood","raw_affiliation_strings":["School of Electrical Engineering & Computer Science, KTH Royal Institute of Technology, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering & Computer Science, KTH Royal Institute of Technology, Stockholm, Sweden","institution_ids":["https://openalex.org/I86987016"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011052188","display_name":"Andrii Shalaginov","orcid":"https://orcid.org/0000-0003-1980-6875"},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Andrii Shalaginov","raw_affiliation_strings":["Department of Information Security & Communication Technology, Norwegian University of Science and Technology, Norway"],"affiliations":[{"raw_affiliation_string":"Department of Information Security & Communication Technology, Norwegian University of Science and Technology, Norway","institution_ids":["https://openalex.org/I204778367"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102842661","display_name":"Mathias Ekstedt","orcid":"https://orcid.org/0000-0003-3922-9606"},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Mathias Ekstedt","raw_affiliation_strings":["School of Electrical Engineering & Computer Science, KTH Royal Institute of Technology, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering & Computer Science, KTH Royal Institute of Technology, Stockholm, Sweden","institution_ids":["https://openalex.org/I86987016"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101788003"],"corresponding_institution_ids":["https://openalex.org/I86987016"],"apc_list":null,"apc_paid":null,"fwci":0.7854,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.8189622,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"3079","last_page":"3087"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9850000143051147,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.8282142281532288},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7257776856422424},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6704074740409851},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.6488773226737976},{"id":"https://openalex.org/keywords/multitude","display_name":"Multitude","score":0.6195840835571289},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5795477628707886},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5208478569984436},{"id":"https://openalex.org/keywords/knowledge-base","display_name":"Knowledge base","score":0.45673251152038574},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.35765624046325684},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.23690947890281677}],"concepts":[{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.8282142281532288},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7257776856422424},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6704074740409851},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.6488773226737976},{"id":"https://openalex.org/C2780565519","wikidata":"https://www.wikidata.org/wiki/Q1208937","display_name":"Multitude","level":2,"score":0.6195840835571289},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5795477628707886},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5208478569984436},{"id":"https://openalex.org/C4554734","wikidata":"https://www.wikidata.org/wiki/Q593744","display_name":"Knowledge base","level":2,"score":0.45673251152038574},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.35765624046325684},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.23690947890281677},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bigdata.2018.8622550","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata.2018.8622550","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1997081029","https://openalex.org/W2041078517","https://openalex.org/W2094562085","https://openalex.org/W2188079924","https://openalex.org/W2287007562","https://openalex.org/W2310426274","https://openalex.org/W2343433123","https://openalex.org/W2474685028","https://openalex.org/W2620766358","https://openalex.org/W2769208058","https://openalex.org/W2781892241","https://openalex.org/W2782983291","https://openalex.org/W2977653791","https://openalex.org/W6686678593"],"related_works":["https://openalex.org/W2181728705","https://openalex.org/W4238452393","https://openalex.org/W2489557937","https://openalex.org/W4247205791","https://openalex.org/W2167366752","https://openalex.org/W3002268218","https://openalex.org/W2385667210","https://openalex.org/W3001565613","https://openalex.org/W1506329045","https://openalex.org/W72026768"],"abstract_inverted_index":{"Power":[0],"systems":[1,141],"domain":[2],"has":[3,33],"generally":[4],"been":[5],"very":[6],"conservative":[7],"in":[8,35,48,58,146],"terms":[9],"of":[10,20,25,31,37,51,60,113,126,150],"conducting":[11],"digital":[12,79,116,136],"forensic":[13,80,137],"investigations,":[14],"especially":[15],"so":[16],"since":[17],"the":[18,49,104,111,135],"advent":[19],"smart":[21,52],"grids.":[22],"This":[23,123],"lack":[24],"research":[26,108],"due":[27],"to":[28,42,63,130],"a":[29,84,148],"multitude":[30],"challenges":[32],"resulted":[34],"absence":[36],"knowledge":[38,151],"base":[39],"and":[40,68,91,132,152],"resources":[41],"facilitate":[43],"such":[44,64],"an":[45,98,101],"investigation.":[46],"Digitalization":[47],"form":[50],"grids":[53],"is":[54,66,124],"upon":[55],"us":[56],"but":[57],"case":[59],"cyber-attacks,":[61],"attribution":[62],"attacks":[65],"challenging":[67],"difficult":[69],"if":[70],"not":[71],"impossible.":[72],"In":[73],"this":[74],"research,":[75],"we":[76],"have":[77],"identified":[78,105],"artifacts":[81],"resulting":[82],"from":[83],"cyber-attack":[85],"on":[86],"Wide":[87],"Area":[88],"Monitoring,":[89],"Protection":[90],"Control":[92],"(WAMPAC)":[93],"systems,":[94],"which":[95,142],"will":[96,143],"help":[97,145],"investigator":[99],"attribute":[100],"attack":[102],"using":[103],"evidences.":[106],"The":[107],"also":[109],"shows":[110],"usage":[112],"sandboxing":[114],"for":[115,139,154],"forensics":[117],"along":[118],"with":[119],"hardware-in-the-loop":[120],"(HIL)":[121],"setup.":[122],"first":[125],"its":[127],"kind":[128],"effort":[129],"identify":[131],"acquire":[133],"all":[134],"evidences":[138],"WAMPAC":[140],"ultimately":[144],"building":[147],"body":[149],"taxonomy":[153],"power":[155],"system":[156],"forensics.":[157]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
