{"id":"https://openalex.org/W4392006368","doi":"https://doi.org/10.1109/comsnets59351.2024.10427215","title":"Cybercrime Investigation Model","display_name":"Cybercrime Investigation Model","publication_year":2024,"publication_date":"2024-01-03","ids":{"openalex":"https://openalex.org/W4392006368","doi":"https://doi.org/10.1109/comsnets59351.2024.10427215"},"language":"en","primary_location":{"id":"doi:10.1109/comsnets59351.2024.10427215","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets59351.2024.10427215","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 16th International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001301716","display_name":"Andrey Chechulin","orcid":"https://orcid.org/0000-0001-7056-6972"},"institutions":[{"id":"https://openalex.org/I4210144352","display_name":"State Research Center of the Russian Federation","ror":"https://ror.org/04qpssw85","country_code":"RU","type":"facility","lineage":["https://openalex.org/I4210144352"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"Andrey Chechulin","raw_affiliation_strings":["St. Petersburg Federal Research Center of the Russian Academy of Science,St. Petersburg,Russia","St. Petersburg Federal Research Center of the Russian Academy of Science, St. Petersburg, Russia"],"raw_orcid":"https://orcid.org/0000-0001-7056-6972","affiliations":[{"raw_affiliation_string":"St. Petersburg Federal Research Center of the Russian Academy of Science,St. Petersburg,Russia","institution_ids":["https://openalex.org/I4210144352"]},{"raw_affiliation_string":"St. Petersburg Federal Research Center of the Russian Academy of Science, St. Petersburg, Russia","institution_ids":["https://openalex.org/I4210144352"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5093972470","display_name":"Maxim Gorda","orcid":"https://orcid.org/0009-0009-1301-7294"},"institutions":[{"id":"https://openalex.org/I4210144352","display_name":"State Research Center of the Russian Federation","ror":"https://ror.org/04qpssw85","country_code":"RU","type":"facility","lineage":["https://openalex.org/I4210144352"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Maxim Gorda","raw_affiliation_strings":["St. Petersburg Federal Research Center of the Russian Academy of Science,St. Petersburg,Russia","St. Petersburg Federal Research Center of the Russian Academy of Science, St. Petersburg, Russia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"St. Petersburg Federal Research Center of the Russian Academy of Science,St. Petersburg,Russia","institution_ids":["https://openalex.org/I4210144352"]},{"raw_affiliation_string":"St. Petersburg Federal Research Center of the Russian Academy of Science, St. Petersburg, Russia","institution_ids":["https://openalex.org/I4210144352"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5001301716"],"corresponding_institution_ids":["https://openalex.org/I4210144352"],"apc_list":null,"apc_paid":null,"fwci":5.222,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.95340135,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"37","last_page":"42"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.8176997900009155},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5758495926856995},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.20065706968307495},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1745952069759369}],"concepts":[{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.8176997900009155},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5758495926856995},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.20065706968307495},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1745952069759369}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/comsnets59351.2024.10427215","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets59351.2024.10427215","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 16th International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7799999713897705}],"awards":[{"id":"https://openalex.org/G7650216858","display_name":null,"funder_award_id":"21-71-20078 in SPC RAS","funder_id":"https://openalex.org/F4320306201","funder_display_name":"Russell Sage Foundation"}],"funders":[{"id":"https://openalex.org/F4320306201","display_name":"Russell Sage Foundation","ror":"https://ror.org/02yh9se80"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W159069299","https://openalex.org/W2328772621","https://openalex.org/W4283788256","https://openalex.org/W4313315068","https://openalex.org/W4362237547","https://openalex.org/W4385692141"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2338899373","https://openalex.org/W4252285266","https://openalex.org/W199254545","https://openalex.org/W2476504758","https://openalex.org/W4248464163","https://openalex.org/W2997836625","https://openalex.org/W111175386"],"abstract_inverted_index":{"The":[0],"rise":[1],"of":[2,58,86],"cybercrime":[3,69],"is":[4],"a":[5,50,94],"daily":[6],"challenge":[7],"for":[8,116],"individuals,":[9],"organizations,":[10],"and":[11,18,32,70,73,79,88,96],"governments,":[12],"especially":[13],"when":[14],"resources":[15],"are":[16,20],"scarce":[17],"cyberattacks":[19],"becoming":[21],"more":[22],"complex.":[23],"These":[24],"organizations":[25,124],"often":[26],"find":[27],"it":[28,98],"difficult":[29],"to":[30,41,48,53,99,119],"identify":[31],"stop":[33],"such":[34],"attacks,":[35],"but":[36],"they":[37],"must":[38],"investigate":[39,120],"them":[40],"reduce":[42],"the":[43,56,89,100,114],"damage.":[44],"This":[45],"study":[46],"aims":[47],"create":[49],"detailed":[51],"model":[52,95,111],"help":[54],"with":[55,125],"investigations":[57,87],"cybercrimes.":[59],"To":[60],"build":[61],"this":[62,110],"model,":[63],"we":[64,74,92],"reviewed":[65],"existing":[66],"research":[67],"on":[68],"investigative":[71],"methods,":[72],"used":[75],"analytical":[76],"techniques,":[77],"studies,":[78],"logical":[80],"reasoning.":[81],"After":[82],"examining":[83],"different":[84],"stages":[85],"information":[90],"needed,":[91],"created":[93],"put":[97],"test":[101],"by":[102],"investigating":[103],"an":[104],"insider":[105],"attack.":[106],"We":[107],"think":[108],"that":[109],"could":[112],"be":[113],"foundation":[115],"practical":[117],"guidelines":[118],"security":[121],"breaches":[122],"in":[123],"either":[126],"limited":[127],"or":[128],"ample":[129],"resources.":[130]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
