{"id":"https://openalex.org/W3139261190","doi":"https://doi.org/10.1109/ccwc51732.2021.9376043","title":"Forensic Requirements Specification for Mobile Device Malware Forensic Models","display_name":"Forensic Requirements Specification for Mobile Device Malware Forensic Models","publication_year":2021,"publication_date":"2021-01-27","ids":{"openalex":"https://openalex.org/W3139261190","doi":"https://doi.org/10.1109/ccwc51732.2021.9376043","mag":"3139261190"},"language":"en","primary_location":{"id":"doi:10.1109/ccwc51732.2021.9376043","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccwc51732.2021.9376043","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086508259","display_name":"Abdullah Mujawib Alashjaee","orcid":"https://orcid.org/0000-0002-8682-6609"},"institutions":[{"id":"https://openalex.org/I118590987","display_name":"Northern Border University","ror":"https://ror.org/03j9tzj20","country_code":"SA","type":"education","lineage":["https://openalex.org/I118590987"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Abdullah Mujawib Alashjaee","raw_affiliation_strings":["Northern Borders University, Arar, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Northern Borders University, Arar, Saudi Arabia","institution_ids":["https://openalex.org/I118590987"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072945483","display_name":"Michael Haney","orcid":"https://orcid.org/0000-0003-2359-2478"},"institutions":[{"id":"https://openalex.org/I155093810","display_name":"University of Idaho","ror":"https://ror.org/03hbp5t65","country_code":"US","type":"education","lineage":["https://openalex.org/I155093810"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael Haney","raw_affiliation_strings":["University of Idaho, Moscow, USA"],"affiliations":[{"raw_affiliation_string":"University of Idaho, Moscow, USA","institution_ids":["https://openalex.org/I155093810"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5086508259"],"corresponding_institution_ids":["https://openalex.org/I118590987"],"apc_list":null,"apc_paid":null,"fwci":0.4571,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.59006085,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"1","issue":null,"first_page":"0930","last_page":"0935"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7723636627197266},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7086982727050781},{"id":"https://openalex.org/keywords/forensic-science","display_name":"Forensic science","score":0.6023193001747131},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.538830578327179},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47647616267204285}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7723636627197266},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7086982727050781},{"id":"https://openalex.org/C140505726","wikidata":"https://www.wikidata.org/wiki/Q495304","display_name":"Forensic science","level":2,"score":0.6023193001747131},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.538830578327179},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47647616267204285},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccwc51732.2021.9376043","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccwc51732.2021.9376043","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.49000000953674316,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W2007857904","https://openalex.org/W2013109736","https://openalex.org/W2031254140","https://openalex.org/W2095644778","https://openalex.org/W2108700604","https://openalex.org/W2134575574","https://openalex.org/W2164558192","https://openalex.org/W2264016719","https://openalex.org/W2291014553","https://openalex.org/W2566616266","https://openalex.org/W2572561735","https://openalex.org/W2575599800","https://openalex.org/W2588748298","https://openalex.org/W2600868865","https://openalex.org/W2612123163","https://openalex.org/W2753585373","https://openalex.org/W2766809087","https://openalex.org/W2768929057","https://openalex.org/W2781653144","https://openalex.org/W2784718811","https://openalex.org/W2809379468","https://openalex.org/W2809820765","https://openalex.org/W2883822334","https://openalex.org/W2900096525","https://openalex.org/W2907236248","https://openalex.org/W2912610007","https://openalex.org/W2913244267","https://openalex.org/W2922526186","https://openalex.org/W2947534985","https://openalex.org/W2958740544","https://openalex.org/W2974875966","https://openalex.org/W2980183803","https://openalex.org/W2982206736","https://openalex.org/W2997373409","https://openalex.org/W3001554073","https://openalex.org/W3004549544","https://openalex.org/W3004724846","https://openalex.org/W3014733766","https://openalex.org/W3017372748","https://openalex.org/W3021426193","https://openalex.org/W3033632180","https://openalex.org/W3089814547","https://openalex.org/W4247833239","https://openalex.org/W6733576531"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819"],"abstract_inverted_index":{"Due":[0],"to":[1,92],"the":[2,13,37,40,56,64,67,115,132],"prevalent":[3],"use":[4],"of":[5,12,30,44,69,82,109,117],"smartphones,":[6],"mobile":[7,16,33,46,100,118,121],"devices":[8,119],"have":[9,27,104],"attracted":[10],"some":[11],"most":[14],"sophisticated":[15],"device":[17,47,101],"malware":[18,34,48,122,140],"in":[19,55,95],"existence.":[20],"Traditional":[21],"forensics":[22],"investigation":[23],"tools":[24,49,71],"and":[25,42,50,72,120,139],"techniques":[26,51],"fallen":[28],"short":[29],"successfully":[31],"investigating":[32,96],"incidents.":[35],"Consequently,":[36],"need":[38],"for":[39,66,131],"design":[41],"development":[43],"specific":[45],"has":[52,60],"been":[53],"raised":[54],"literature.":[57],"However,":[58],"it":[59],"become":[61],"clear":[62],"that":[63,84,111],"requirements":[65,83,110,126],"evaluation":[68],"such":[70],"methods":[73],"are":[74,127],"missing.":[75],"This":[76],"research":[77],"paper":[78],"proposes":[79],"a":[80,106],"set":[81],"should":[85],"be":[86,93],"met":[87],"by":[88],"forensic":[89,141],"models":[90],"meant":[91],"used":[94],"security":[97],"incidents":[98],"involving":[99],"malware.":[102],"We":[103],"defined":[105],"sufficient":[107],"number":[108],"take":[112],"into":[113],"consideration":[114],"characteristics":[116],"as":[123,129],"well.":[124],"The":[125],"designed":[128],"solutions":[130],"limitations":[133],"associated":[134],"with":[135],"existing":[136],"conventional":[137],"digital":[138],"models.":[142]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
