{"id":"https://openalex.org/W2744356685","doi":"https://doi.org/10.1109/cybersa.2017.8073402","title":"Visualisation of device datasets to assist digital forensic investigation","display_name":"Visualisation of device datasets to assist digital forensic investigation","publication_year":2017,"publication_date":"2017-06-01","ids":{"openalex":"https://openalex.org/W2744356685","doi":"https://doi.org/10.1109/cybersa.2017.8073402","mag":"2744356685"},"language":"en","primary_location":{"id":"doi:10.1109/cybersa.2017.8073402","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cybersa.2017.8073402","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://rke.abertay.ac.uk/en/publications/4f45f080-7f2a-44b5-940b-54cad3d77638","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004984925","display_name":"Gavin Hales","orcid":null},"institutions":[{"id":"https://openalex.org/I877506347","display_name":"Abertay University","ror":"https://ror.org/04mwwnx67","country_code":"GB","type":"education","lineage":["https://openalex.org/I877506347"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Gavin Hales","raw_affiliation_strings":["Division of Computing and Maths, Abertay University, Dundee, UK"],"affiliations":[{"raw_affiliation_string":"Division of Computing and Maths, Abertay University, Dundee, UK","institution_ids":["https://openalex.org/I877506347"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5004984925"],"corresponding_institution_ids":["https://openalex.org/I877506347"],"apc_list":null,"apc_paid":null,"fwci":0.277,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.64136752,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2","issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10799","display_name":"Data Visualization and Analytics","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10799","display_name":"Data Visualization and Analytics","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.818011999130249},{"id":"https://openalex.org/keywords/workload","display_name":"Workload","score":0.810404360294342},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.7546343207359314},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7393182516098022},{"id":"https://openalex.org/keywords/digital-evidence","display_name":"Digital evidence","score":0.6983083486557007},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.6733288764953613},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.6138538718223572},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.5825121402740479},{"id":"https://openalex.org/keywords/data-visualization","display_name":"Data visualization","score":0.4115591049194336},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40748167037963867},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.25073933601379395},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.08007529377937317}],"concepts":[{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.818011999130249},{"id":"https://openalex.org/C2778476105","wikidata":"https://www.wikidata.org/wiki/Q628539","display_name":"Workload","level":2,"score":0.810404360294342},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.7546343207359314},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7393182516098022},{"id":"https://openalex.org/C2781357168","wikidata":"https://www.wikidata.org/wiki/Q5276084","display_name":"Digital evidence","level":3,"score":0.6983083486557007},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.6733288764953613},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.6138538718223572},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.5825121402740479},{"id":"https://openalex.org/C172367668","wikidata":"https://www.wikidata.org/wiki/Q6504956","display_name":"Data visualization","level":3,"score":0.4115591049194336},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40748167037963867},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.25073933601379395},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.08007529377937317},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/cybersa.2017.8073402","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cybersa.2017.8073402","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","raw_type":"proceedings-article"},{"id":"pmh:oai:rke.abertay.ac.uk:openaire_cris_publications/4f45f080-7f2a-44b5-940b-54cad3d77638","is_oa":true,"landing_page_url":"https://rke.abertay.ac.uk/en/publications/4f45f080-7f2a-44b5-940b-54cad3d77638","pdf_url":null,"source":{"id":"https://openalex.org/S4306402526","display_name":"Abertay Research Portal (Abertay University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I877506347","host_organization_name":"Abertay University","host_organization_lineage":["https://openalex.org/I877506347"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Hales , G 2017 , Visualisation of device datasets to assist digital forensic investigation . in Proceedings of the International Conference On Cyber Situational Awareness, Data Analytics And Assessment- CyberSA . 2017 International Conference on Cyber Situational Awareness, Data Analytics and Assessment , London , United Kingdom , 19/06/17 . https://doi.org/10.1109/CyberSA.2017.8073402","raw_type":"contributionToPeriodical"}],"best_oa_location":{"id":"pmh:oai:rke.abertay.ac.uk:openaire_cris_publications/4f45f080-7f2a-44b5-940b-54cad3d77638","is_oa":true,"landing_page_url":"https://rke.abertay.ac.uk/en/publications/4f45f080-7f2a-44b5-940b-54cad3d77638","pdf_url":null,"source":{"id":"https://openalex.org/S4306402526","display_name":"Abertay Research Portal (Abertay University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I877506347","host_organization_name":"Abertay University","host_organization_lineage":["https://openalex.org/I877506347"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Hales , G 2017 , Visualisation of device datasets to assist digital forensic investigation . in Proceedings of the International Conference On Cyber Situational Awareness, Data Analytics And Assessment- CyberSA . 2017 International Conference on Cyber Situational Awareness, Data Analytics and Assessment , London , United Kingdom , 19/06/17 . https://doi.org/10.1109/CyberSA.2017.8073402","raw_type":"contributionToPeriodical"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7599999904632568}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W651170604","https://openalex.org/W1545766451","https://openalex.org/W2087888801","https://openalex.org/W2097392047","https://openalex.org/W2138199375","https://openalex.org/W2156350103","https://openalex.org/W2416388704","https://openalex.org/W2507844636","https://openalex.org/W2784874203","https://openalex.org/W6748477673"],"related_works":["https://openalex.org/W2598491911","https://openalex.org/W2181728705","https://openalex.org/W4247205791","https://openalex.org/W4242633011","https://openalex.org/W2489557937","https://openalex.org/W4238452393","https://openalex.org/W2536999591","https://openalex.org/W54587564","https://openalex.org/W2620272321","https://openalex.org/W1576621636"],"abstract_inverted_index":{"The":[0,23],"increasing":[1],"use":[2],"of":[3,76,93,102],"digital":[4,16,106],"devices":[5],"in":[6],"our":[7],"everyday":[8],"lives,":[9],"and":[10,29,99],"their":[11],"ever-increasing":[12],"storage":[13],"capacities":[14],"places":[15],"forensics":[17],"investigatory":[18],"resources":[19],"under":[20],"significant":[21],"pressure.":[22],"workload":[24],"for":[25,48,95],"investigators":[26],"is":[27,37,79],"increasing,":[28],"the":[30,35,46,62,85],"time":[31,64],"required":[32],"to":[33,40,53,60,66,87,89],"analyse":[34],"datasets":[36],"not":[38],"decreasing":[39,61],"compensate.":[41],"This":[42],"research":[43],"looks":[44],"at":[45],"potential":[47,86],"utilising":[49],"information":[50],"visualisation":[51],"techniques":[52],"increase":[54],"investigative":[55],"efficiency":[56],"with":[57],"a":[58,68,73,90],"view":[59],"overall":[63],"taken":[65],"investigate":[67],"case,":[69],"while":[70],"still":[71],"maintaining":[72],"high":[74],"level":[75],"accuracy.":[77],"It":[78],"envisaged":[80],"that":[81],"this":[82],"may":[83],"have":[84],"lead":[88],"reduced":[91],"backlog":[92],"cases":[94,104],"law":[96],"enforcement":[97],"agencies,":[98],"expedited":[100],"processing":[101],"criminal":[103],"involving":[105],"evidence.":[107]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
