{"id":"https://openalex.org/W3024263644","doi":"https://doi.org/10.1109/iciot48696.2020.9089494","title":"Proactive Forensics: Keystroke Logging from the Cloud as Potential Digital Evidence for Forensic Readiness Purposes","display_name":"Proactive Forensics: Keystroke Logging from the Cloud as Potential Digital Evidence for Forensic Readiness Purposes","publication_year":2020,"publication_date":"2020-02-01","ids":{"openalex":"https://openalex.org/W3024263644","doi":"https://doi.org/10.1109/iciot48696.2020.9089494","mag":"3024263644"},"language":"en","primary_location":{"id":"doi:10.1109/iciot48696.2020.9089494","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iciot48696.2020.9089494","pdf_url":null,"source":{"id":"https://openalex.org/S4306498678","display_name":"2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ro.ecu.edu.au/ecuworkspost2013/8544","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031689409","display_name":"Sheunesu Makura","orcid":"https://orcid.org/0000-0002-5129-3216"},"institutions":[{"id":"https://openalex.org/I69552723","display_name":"University of Pretoria","ror":"https://ror.org/00g0p6g84","country_code":"ZA","type":"education","lineage":["https://openalex.org/I69552723"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Sheunesu M. Makura","raw_affiliation_strings":["Department of Computer Science, Faculty of EBIT, University of Pretoria, Pretoria, South Africa"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of EBIT, University of Pretoria, Pretoria, South Africa","institution_ids":["https://openalex.org/I69552723"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037461417","display_name":"Hein S. Venter","orcid":"https://orcid.org/0000-0002-3607-8630"},"institutions":[{"id":"https://openalex.org/I69552723","display_name":"University of Pretoria","ror":"https://ror.org/00g0p6g84","country_code":"ZA","type":"education","lineage":["https://openalex.org/I69552723"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"H. S. Venter","raw_affiliation_strings":["Department of Computer Science, Faculty of EBIT, University of Pretoria, Pretoria, South Africa"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of EBIT, University of Pretoria, Pretoria, South Africa","institution_ids":["https://openalex.org/I69552723"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001801878","display_name":"Richard A. Ikuesan","orcid":"https://orcid.org/0000-0001-7355-2314"},"institutions":[{"id":"https://openalex.org/I4210116586","display_name":"Community College of Qatar","ror":"https://ror.org/01psb9158","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210116586"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Richard Adeyemi Ikuesan","raw_affiliation_strings":["Cybersecurity and Networking Department, School of Information Technology, Community College of Qatar, Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Cybersecurity and Networking Department, School of Information Technology, Community College of Qatar, Doha, Qatar","institution_ids":["https://openalex.org/I4210116586"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063662573","display_name":"Victor R. Kebande","orcid":"https://orcid.org/0000-0003-4071-4596"},"institutions":[{"id":"https://openalex.org/I183111857","display_name":"Malm\u00f6 University","ror":"https://ror.org/05wp7an13","country_code":"SE","type":"education","lineage":["https://openalex.org/I183111857"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Victor R. Kebande","raw_affiliation_strings":["Computer Science & MT, Malm\u00f6 Universitet, Malm\u00f6, Sweden"],"affiliations":[{"raw_affiliation_string":"Computer Science & MT, Malm\u00f6 Universitet, Malm\u00f6, Sweden","institution_ids":["https://openalex.org/I183111857"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017842570","display_name":"Nickson M. Karie","orcid":"https://orcid.org/0000-0001-5173-9268"},"institutions":[{"id":"https://openalex.org/I12079687","display_name":"Edith Cowan University","ror":"https://ror.org/05jhnwe22","country_code":"AU","type":"education","lineage":["https://openalex.org/I12079687"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Nickson M. Karie","raw_affiliation_strings":["Security Research Institute, School of Science-Edith Cowan University, Joondalup, Australia"],"affiliations":[{"raw_affiliation_string":"Security Research Institute, School of Science-Edith Cowan University, Joondalup, Australia","institution_ids":["https://openalex.org/I12079687"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5031689409"],"corresponding_institution_ids":["https://openalex.org/I69552723"],"apc_list":null,"apc_paid":null,"fwci":6.1659,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.9687903,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"200","last_page":"205"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-evidence","display_name":"Digital evidence","score":0.9091799259185791},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.8864504098892212},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7496589422225952},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7097675800323486},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6971703767776489},{"id":"https://openalex.org/keywords/network-forensics","display_name":"Network forensics","score":0.6819717288017273},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.6180071234703064},{"id":"https://openalex.org/keywords/keystroke-logging","display_name":"Keystroke logging","score":0.617599368095398},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5818032026290894},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5765938758850098},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.42114490270614624},{"id":"https://openalex.org/keywords/connotation","display_name":"Connotation","score":0.4177859127521515},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07614389061927795}],"concepts":[{"id":"https://openalex.org/C2781357168","wikidata":"https://www.wikidata.org/wiki/Q5276084","display_name":"Digital evidence","level":3,"score":0.9091799259185791},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.8864504098892212},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7496589422225952},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7097675800323486},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6971703767776489},{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.6819717288017273},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.6180071234703064},{"id":"https://openalex.org/C161615301","wikidata":"https://www.wikidata.org/wiki/Q309396","display_name":"Keystroke logging","level":2,"score":0.617599368095398},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5818032026290894},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5765938758850098},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.42114490270614624},{"id":"https://openalex.org/C2778120531","wikidata":"https://www.wikidata.org/wiki/Q661062","display_name":"Connotation","level":2,"score":0.4177859127521515},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07614389061927795},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/iciot48696.2020.9089494","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iciot48696.2020.9089494","pdf_url":null,"source":{"id":"https://openalex.org/S4306498678","display_name":"2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT)","raw_type":"proceedings-article"},{"id":"pmh:oai:ro.ecu.edu.au:ecuworkspost2013-9550","is_oa":true,"landing_page_url":"https://ro.ecu.edu.au/ecuworkspost2013/8544","pdf_url":null,"source":{"id":"https://openalex.org/S2765015692","display_name":"Australasian Journal of Paramedicine","issn_l":"2202-7270","issn":["2202-7270"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Research outputs 2014 to 2021","raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:ro.ecu.edu.au:ecuworkspost2013-9550","is_oa":true,"landing_page_url":"https://ro.ecu.edu.au/ecuworkspost2013/8544","pdf_url":null,"source":{"id":"https://openalex.org/S2765015692","display_name":"Australasian Journal of Paramedicine","issn_l":"2202-7270","issn":["2202-7270"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Research outputs 2014 to 2021","raw_type":"text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.5699999928474426}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W31019238","https://openalex.org/W1498391511","https://openalex.org/W1501452548","https://openalex.org/W1526879126","https://openalex.org/W1534992827","https://openalex.org/W1988933354","https://openalex.org/W2016917250","https://openalex.org/W2095163644","https://openalex.org/W2096712814","https://openalex.org/W2275530856","https://openalex.org/W2428850758","https://openalex.org/W2525228524","https://openalex.org/W2573841943","https://openalex.org/W2582443164","https://openalex.org/W2782256945","https://openalex.org/W2786460113","https://openalex.org/W2788400765","https://openalex.org/W2890886735","https://openalex.org/W2904398394","https://openalex.org/W2940371950","https://openalex.org/W2953564444","https://openalex.org/W2964150038","https://openalex.org/W3123690110","https://openalex.org/W4243115967","https://openalex.org/W6629610128","https://openalex.org/W6629906362","https://openalex.org/W6631430836","https://openalex.org/W6959885646"],"related_works":["https://openalex.org/W4238452393","https://openalex.org/W2489557937","https://openalex.org/W4283205458","https://openalex.org/W4240498326","https://openalex.org/W2480188389","https://openalex.org/W3001565613","https://openalex.org/W3018602826","https://openalex.org/W2981476769","https://openalex.org/W2904082727","https://openalex.org/W4391002340"],"abstract_inverted_index":{"The":[0,90,187,216],"relationship":[1,27],"between":[2,28,39],"negative":[3,34],"and":[4,33,112,124,176,212],"positive":[5,32,52,102],"connotations":[6],"with":[7],"regard":[8],"to":[9,18,97,203],"malware":[10],"in":[11,55,61,81,118,197],"the":[12,19,29,40,46,56,70,93,99,134,146,152,162,166,171,179,184,191,198],"cloud":[13,163,199],"is":[14,24,67,158],"rarely":[15],"investigated":[16],"according":[17],"prevailing":[20],"literature.":[21],"However,":[22],"there":[23],"a":[25,62,84,105,137,221],"significant":[26,222],"use":[30,45,98],"of":[31,58,72,83,95,107,139,148,173,181,193,207],"connotations.":[35],"A":[36],"clear":[37],"distinction":[38],"two":[41],"emanates":[42],"when":[43],"we":[44],"originally":[47,153],"considered":[48,154],"malicious":[49,155,194],"code,":[50],"for":[51,75,101],"connotation":[53],"like":[54],"case":[57],"capturing":[59],"keystrokes":[60,100,218],"proactive":[63,227],"forensic":[64],"purpose.":[65],"This":[66,157],"done":[68],"during":[69],"collection":[71,147],"digital":[73,149,174],"evidence":[74,109],"Digital":[76,85],"Forensic":[77,86],"Readiness":[78],"(DFR)":[79],"purposes,":[80],"preparation":[82],"Investigation":[87],"(DFI)":[88],"process.":[89],"paper":[91,188],"explores":[92],"problem":[94],"having":[96],"reasons":[103],"as":[104,116],"piece":[106],"potential":[108],"through":[110,145,209],"extraction":[111],"digitally":[113,213],"preserving":[114,170,214],"it":[115],"highlighted":[117],"ISO/IEC":[119,125],"27037:":[120],"2012":[121],"(security":[122],"approaches)":[123],"27043:":[126],"2015":[127],"(legal":[128],"connotations).":[129],"In":[130],"this":[131],"paper,":[132],"therefore,":[133],"authors":[135],"present":[136],"technique":[138],"how":[140],"DFR":[141,208],"can":[142,200],"be":[143,201],"achieved":[144,159],"information":[150,175],"from":[151],"code.":[156],"without":[160],"modifying":[161],"operations":[164],"or":[165],"infrastructure":[167],"thereof,":[168],"while":[169],"integrity":[172],"possibly":[177],"maintain":[178],"chain":[180],"custody":[182],"at":[183],"same":[185],"time.":[186],"proposes":[189],"that":[190,224],"threshold":[192],"code":[195],"intrusion":[196],"transformed":[202],"an":[204],"efficacious":[205],"process":[206],"logical":[210],"acquisition":[211],"keystrokes.":[215],"experiment-tested":[217],"have":[219],"shown":[220],"approach":[223],"could":[225],"achieve":[226],"forensics.":[228]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":12},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
