{"id":"https://openalex.org/W2935961537","doi":"https://doi.org/10.1109/icgs3.2019.8688020","title":"Next-Generation Digital Forensics: Challenges and Future Paradigms","display_name":"Next-Generation Digital Forensics: Challenges and Future Paradigms","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2935961537","doi":"https://doi.org/10.1109/icgs3.2019.8688020","mag":"2935961537"},"language":"en","primary_location":{"id":"doi:10.1109/icgs3.2019.8688020","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icgs3.2019.8688020","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083073077","display_name":"Reza Montasari","orcid":"https://orcid.org/0000-0001-7136-6753"},"institutions":[{"id":"https://openalex.org/I133837150","display_name":"University of Huddersfield","ror":"https://ror.org/05t1h8f27","country_code":"GB","type":"education","lineage":["https://openalex.org/I133837150"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Reza Montasari","raw_affiliation_strings":["Department of Computing and Engineering, The University of Huddersfield, Huddersfield, U.K"],"affiliations":[{"raw_affiliation_string":"Department of Computing and Engineering, The University of Huddersfield, Huddersfield, U.K","institution_ids":["https://openalex.org/I133837150"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027030244","display_name":"Richard Hill","orcid":"https://orcid.org/0000-0003-0105-7730"},"institutions":[{"id":"https://openalex.org/I133837150","display_name":"University of Huddersfield","ror":"https://ror.org/05t1h8f27","country_code":"GB","type":"education","lineage":["https://openalex.org/I133837150"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Richard Hill","raw_affiliation_strings":["Department of Computing and Engineering, The University of Huddersfield, Huddersfield, U.K"],"affiliations":[{"raw_affiliation_string":"Department of Computing and Engineering, The University of Huddersfield, Huddersfield, U.K","institution_ids":["https://openalex.org/I133837150"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5083073077"],"corresponding_institution_ids":["https://openalex.org/I133837150"],"apc_list":null,"apc_paid":null,"fwci":11.9775,"has_fulltext":false,"cited_by_count":68,"citation_normalized_percentile":{"value":0.98473288,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"205","last_page":"212"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.774545431137085},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6021026968955994},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5844293832778931},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5692218542098999},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.55875563621521},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5257989764213562},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4879312217235565},{"id":"https://openalex.org/keywords/information-and-communications-technology","display_name":"Information and Communications Technology","score":0.48189789056777954},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.47453582286834717},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.38667818903923035},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2795145809650421},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.1277734935283661}],"concepts":[{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.774545431137085},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6021026968955994},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5844293832778931},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5692218542098999},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.55875563621521},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5257989764213562},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4879312217235565},{"id":"https://openalex.org/C67363961","wikidata":"https://www.wikidata.org/wiki/Q5268834","display_name":"Information and Communications Technology","level":2,"score":0.48189789056777954},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.47453582286834717},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.38667818903923035},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2795145809650421},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.1277734935283661},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/icgs3.2019.8688020","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icgs3.2019.8688020","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3)","raw_type":"proceedings-article"},{"id":"pmh:oai:cronfa.swan.ac.uk:cronfa54946","is_oa":false,"landing_page_url":"https://cronfa.swan.ac.uk/Record/cronfa54946","pdf_url":null,"source":{"id":"https://openalex.org/S4306401612","display_name":"Cronfa (Swansea University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I39586589","host_organization_name":"Swansea University","host_organization_lineage":["https://openalex.org/I39586589"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Paper/Proceeding/Abstract"},{"id":"pmh:oai:pure.atira.dk:publications/927fba07-4acb-4301-be01-59a3129c26a7","is_oa":false,"landing_page_url":"https://pure.hud.ac.uk/en/publications/927fba07-4acb-4301-be01-59a3129c26a7","pdf_url":null,"source":{"id":"https://openalex.org/S4306402508","display_name":"Huddersfield Research Portal (University of Huddersfield)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I133837150","host_organization_name":"University of Huddersfield","host_organization_lineage":["https://openalex.org/I133837150"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Montasari, R & Hill, R 2019, Next-Generation Digital Forensics : Challenges and Future Paradigms. in Proceedings of 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability, ICGS3., 8688020, IEEE, London, pp. 205-212, 12th International Conference on Global Security, Safety and Sustainability, London, United Kingdom, 16/01/19. https://doi.org/10.1109/ICGS3.2019.8688020","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5699999928474426,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W56798659","https://openalex.org/W1521737313","https://openalex.org/W1538546197","https://openalex.org/W1716831257","https://openalex.org/W1966741850","https://openalex.org/W1967185460","https://openalex.org/W1969238379","https://openalex.org/W1987164007","https://openalex.org/W1996767106","https://openalex.org/W1998964974","https://openalex.org/W2010965336","https://openalex.org/W2014113877","https://openalex.org/W2039233071","https://openalex.org/W2054018023","https://openalex.org/W2066500984","https://openalex.org/W2068524740","https://openalex.org/W2069974347","https://openalex.org/W2076342816","https://openalex.org/W2086549170","https://openalex.org/W2087888801","https://openalex.org/W2090540886","https://openalex.org/W2096723158","https://openalex.org/W2156350103","https://openalex.org/W2166423929","https://openalex.org/W2204328961","https://openalex.org/W2243827212","https://openalex.org/W2465829845","https://openalex.org/W2509893441","https://openalex.org/W2523853946","https://openalex.org/W2528201848","https://openalex.org/W2567969459","https://openalex.org/W2588810385","https://openalex.org/W2730257958","https://openalex.org/W2739334709","https://openalex.org/W2752494795","https://openalex.org/W2770291346","https://openalex.org/W2795164731","https://openalex.org/W2940859557","https://openalex.org/W3102095724","https://openalex.org/W3127548822","https://openalex.org/W4236454837","https://openalex.org/W4285719527","https://openalex.org/W4292693418","https://openalex.org/W4297667799","https://openalex.org/W6603646287","https://openalex.org/W6637452385","https://openalex.org/W6727852214","https://openalex.org/W6741502601","https://openalex.org/W6790479236"],"related_works":["https://openalex.org/W2505820029","https://openalex.org/W4378234050","https://openalex.org/W2159614226","https://openalex.org/W2620272321","https://openalex.org/W2185441218","https://openalex.org/W1531316950","https://openalex.org/W3015503851","https://openalex.org/W1576621636","https://openalex.org/W54587564","https://openalex.org/W2552093437"],"abstract_inverted_index":{"In":[0],"recent":[1],"years,":[2],"Information":[3],"and":[4,20,36,51,180,201],"Communications":[5],"Technology":[6],"(ICT)":[7],"has":[8],"rapidly":[9,55],"advanced,":[10],"bringing":[11],"numerous":[12],"benefits":[13,42],"to":[14,43,128,159,174,208],"the":[15,58,76,87,99,103,140,146,160,167,193],"lives":[16],"of":[17,26,61,89,105,108,119,143,148,162,195],"many":[18,41,62,73],"individuals":[19,63],"organisations.":[21],"Technologies":[22],"such":[23],"as":[24],"Internet":[25],"Things":[27],"(loT)":[28],"solutions,":[29],"Cloud-Based":[30],"Services":[31],"(CBSs),":[32],"Cyber-Physical":[33],"Systems":[34],"(CPSs)":[35],"mobile":[37],"devices":[38],"have":[39,54],"brought":[40],"technologically-advanced":[44],"societies.":[45,67],"As":[46,84],"a":[47,85,106,205],"result,":[48,86],"commercial":[49],"transactions":[50],"governmental":[52],"services":[53],"grown,":[56],"revolutionising":[57],"life":[59],"styles":[60],"living":[64],"in":[65,102,203],"these":[66,131],"While":[68],"technological":[69],"advancements":[70],"undoubtedly":[71],"present":[72],"advantages,":[74],"at":[75],"same":[77],"time":[78],"they":[79],"pose":[80],"new":[81,123,206],"security":[82,132],"threats.":[83,133],"number":[88],"cases":[90,109],"that":[91,122,172],"necessitate":[92],"Digital":[93,149,181],"Forensic":[94,182],"Investigations":[95],"(DFIs)":[96],"are":[97],"on":[98],"rise,":[100],"culminating":[101],"creation":[104],"backlog":[107],"for":[110],"law":[111],"enforcement":[112],"agencies":[113],"(LEAs)":[114],"worldwide.":[115],"Therefore,":[116],"it":[117,165,186],"is":[118],"paramount":[120],"importance":[121],"research":[124,153,191],"approaches":[125],"be":[126,175],"adopted":[127],"deal":[129],"with":[130],"To":[134],"this":[135,137],"end,":[136],"paper":[138],"evaluates":[139],"existing":[141],"set":[142],"circumstances":[144],"surrounding":[145],"field":[147,161],"Forensics":[150],"(DF).":[151],"Our":[152],"study":[154],"makes":[155],"two":[156],"important":[157,188],"contributions":[158],"DF.":[163],"First,":[164],"analyses":[166],"most":[168],"difficult":[169],"technical":[170],"challenges":[171],"need":[173],"considered":[176],"by":[177],"both":[178,199],"LEAs":[179,200],"Experts":[183],"(DFEs).":[184],"Second,":[185],"proposes":[187],"specific":[189],"future":[190],"directions,":[192],"undertaking":[194],"which":[196],"can":[197],"assist":[198],"DFEs":[202],"adopting":[204],"approach":[207],"combating":[209],"cyber-attacks.":[210]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":12},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":13},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":12},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
