{"id":"https://openalex.org/W2059673971","doi":"https://doi.org/10.1109/cisim.2010.5643653","title":"Protecting corporate ICT infrastructures by using digital forensics","display_name":"Protecting corporate ICT infrastructures by using digital forensics","publication_year":2010,"publication_date":"2010-10-01","ids":{"openalex":"https://openalex.org/W2059673971","doi":"https://doi.org/10.1109/cisim.2010.5643653","mag":"2059673971"},"language":"en","primary_location":{"id":"doi:10.1109/cisim.2010.5643653","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisim.2010.5643653","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069180039","display_name":"Syed Naqvi","orcid":"https://orcid.org/0009-0002-1751-1117"},"institutions":[{"id":"https://openalex.org/I4210118258","display_name":"Centre d'Excellence en Technologies de l'Information et de la Communication","ror":"https://ror.org/02ma6j015","country_code":"BE","type":"nonprofit","lineage":["https://openalex.org/I4210118258"]}],"countries":["BE"],"is_corresponding":true,"raw_author_name":"Syed Naqvi","raw_affiliation_strings":["Software and System Engineering Department, Centre d''Excellence en Technologies de l''Information et de la Communication, Charleroi, Belgium","Software and System Engineering Department, Centre d'Excellence en Technologies de l'Information et de la Communication (CETIC), 29 Rue des Fr\u00e8res Wright, 6041 Charleroi, Belgium"],"affiliations":[{"raw_affiliation_string":"Software and System Engineering Department, Centre d''Excellence en Technologies de l''Information et de la Communication, Charleroi, Belgium","institution_ids":["https://openalex.org/I4210118258"]},{"raw_affiliation_string":"Software and System Engineering Department, Centre d'Excellence en Technologies de l'Information et de la Communication (CETIC), 29 Rue des Fr\u00e8res Wright, 6041 Charleroi, Belgium","institution_ids":["https://openalex.org/I4210118258"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068147817","display_name":"Gautier Dallons","orcid":null},"institutions":[{"id":"https://openalex.org/I4210118258","display_name":"Centre d'Excellence en Technologies de l'Information et de la Communication","ror":"https://ror.org/02ma6j015","country_code":"BE","type":"nonprofit","lineage":["https://openalex.org/I4210118258"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Gautier Dallons","raw_affiliation_strings":["Software and System Engineering Department, Centre d''Excellence en Technologies de l''Information et de la Communication, Charleroi, Belgium","Software and System Engineering Department, Centre d'Excellence en Technologies de l'Information et de la Communication (CETIC), 29 Rue des Fr\u00e8res Wright, 6041 Charleroi, Belgium"],"affiliations":[{"raw_affiliation_string":"Software and System Engineering Department, Centre d''Excellence en Technologies de l''Information et de la Communication, Charleroi, Belgium","institution_ids":["https://openalex.org/I4210118258"]},{"raw_affiliation_string":"Software and System Engineering Department, Centre d'Excellence en Technologies de l'Information et de la Communication (CETIC), 29 Rue des Fr\u00e8res Wright, 6041 Charleroi, Belgium","institution_ids":["https://openalex.org/I4210118258"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025787987","display_name":"Christophe Ponsard","orcid":"https://orcid.org/0000-0002-5027-2114"},"institutions":[{"id":"https://openalex.org/I4210118258","display_name":"Centre d'Excellence en Technologies de l'Information et de la Communication","ror":"https://ror.org/02ma6j015","country_code":"BE","type":"nonprofit","lineage":["https://openalex.org/I4210118258"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Christophe Ponsard","raw_affiliation_strings":["Software and System Engineering Department, Centre d''Excellence en Technologies de l''Information et de la Communication, Charleroi, Belgium","Software and System Engineering Department, Centre d'Excellence en Technologies de l'Information et de la Communication (CETIC), 29 Rue des Fr\u00e8res Wright, 6041 Charleroi, Belgium"],"affiliations":[{"raw_affiliation_string":"Software and System Engineering Department, Centre d''Excellence en Technologies de l''Information et de la Communication, Charleroi, Belgium","institution_ids":["https://openalex.org/I4210118258"]},{"raw_affiliation_string":"Software and System Engineering Department, Centre d'Excellence en Technologies de l'Information et de la Communication (CETIC), 29 Rue des Fr\u00e8res Wright, 6041 Charleroi, Belgium","institution_ids":["https://openalex.org/I4210118258"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5069180039"],"corresponding_institution_ids":["https://openalex.org/I4210118258"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.14998393,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"255","last_page":"258"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-and-communications-technology","display_name":"Information and Communications Technology","score":0.8397959470748901},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.7751251459121704},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.7111208438873291},{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.6423752903938293},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.6126804351806641},{"id":"https://openalex.org/keywords/digital-evidence","display_name":"Digital evidence","score":0.5344862937927246},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.5296615958213806},{"id":"https://openalex.org/keywords/cyber-crime","display_name":"Cyber crime","score":0.5071754455566406},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47429564595222473},{"id":"https://openalex.org/keywords/network-forensics","display_name":"Network forensics","score":0.4476274847984314},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.38902801275253296},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.33938702940940857},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1906261444091797},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.14810949563980103}],"concepts":[{"id":"https://openalex.org/C67363961","wikidata":"https://www.wikidata.org/wiki/Q5268834","display_name":"Information and Communications Technology","level":2,"score":0.8397959470748901},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.7751251459121704},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.7111208438873291},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.6423752903938293},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.6126804351806641},{"id":"https://openalex.org/C2781357168","wikidata":"https://www.wikidata.org/wiki/Q5276084","display_name":"Digital evidence","level":3,"score":0.5344862937927246},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5296615958213806},{"id":"https://openalex.org/C2989129637","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cyber crime","level":3,"score":0.5071754455566406},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47429564595222473},{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.4476274847984314},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.38902801275253296},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.33938702940940857},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1906261444091797},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.14810949563980103},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cisim.2010.5643653","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisim.2010.5643653","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W2085373733","https://openalex.org/W2156350103","https://openalex.org/W2306547949","https://openalex.org/W6698512966"],"related_works":["https://openalex.org/W4238452393","https://openalex.org/W2489557937","https://openalex.org/W4240498326","https://openalex.org/W2480188389","https://openalex.org/W2961202638","https://openalex.org/W4283205458","https://openalex.org/W93745046","https://openalex.org/W4242080468","https://openalex.org/W3000838006","https://openalex.org/W2883757844"],"abstract_inverted_index":{"Digital":[0],"forensics":[1,71,114,127,158],"is":[2,16,24,27,81,148],"usually":[3],"seen":[4,31],"as":[5,32,90],"a":[6,19,33,53,59,83,122],"specialised":[7],"domain":[8],"of":[9,35,40,47,58,94,112,133,139,156],"information":[10],"and":[11,29,74],"communication":[12],"technologies":[13],"(ICT)":[14],"that":[15],"employed":[17],"when":[18],"serious":[20],"crime":[21,38],"involving":[22],"ICT":[23,49,61,118,135,145],"committed.":[25],"It":[26,120],"by":[28],"large":[30],"responsibility":[34],"the":[36,48,69,75,87,91,99,110,116,143,153,160],"computer":[37],"units":[39],"law":[41],"enforcement":[42],"agencies":[43],"to":[44,67,103,151],"conduct":[45],"examinations":[46],"resources":[50],"used":[51],"in":[52,86,115],"crime.":[54],"The":[55],"staff":[56],"members":[57],"corporate":[60,95,117,134,144],"team":[62],"are":[63],"therefore":[64],"not":[65],"required":[66],"acquire":[68],"digital":[70,113,126,157],"analysis":[72,101,128],"skills":[73],"corresponding":[76],"investigation":[77],"tools.":[78],"This":[79,107],"trend":[80],"experiencing":[82],"significant":[84],"shift":[85],"recent":[88],"years":[89],"commercial":[92],"interests":[93],"sector":[96],"increasingly":[97],"require":[98],"post-incident":[100],"capabilities":[102],"ensure":[104],"business":[105],"continuity.":[106],"paper":[108],"highlights":[109],"role":[111],"infrastructure.":[119],"presents":[121],"framework":[123],"for":[124,142],"embedding":[125],"techniques":[129],"at":[130,159],"various":[131],"stages":[132],"lifecycle.":[136],"A":[137],"set":[138],"best":[140],"practices":[141],"security":[146],"policy":[147],"also":[149],"outlined":[150],"keep":[152],"operational":[154],"costs":[155],"optimal":[161],"level.":[162]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
