{"id":"https://openalex.org/W2322318259","doi":"https://doi.org/10.1109/ictc.2014.6983317","title":"Cyber incident forensics as a forward lean security","display_name":"Cyber incident forensics as a forward lean security","publication_year":2014,"publication_date":"2014-10-01","ids":{"openalex":"https://openalex.org/W2322318259","doi":"https://doi.org/10.1109/ictc.2014.6983317","mag":"2322318259"},"language":"en","primary_location":{"id":"doi:10.1109/ictc.2014.6983317","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ictc.2014.6983317","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 International Conference on Information and Communication Technology Convergence (ICTC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100401547","display_name":"Jooyoung Lee","orcid":"https://orcid.org/0000-0003-0753-0699"},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Jooyoung Lee","raw_affiliation_strings":["Cyber Security Convergence Research Laboratory, Electronics and Telecommunications Research Institute (ETRI), Daejeon, Korea"],"affiliations":[{"raw_affiliation_string":"Cyber Security Convergence Research Laboratory, Electronics and Telecommunications Research Institute (ETRI), Daejeon, Korea","institution_ids":["https://openalex.org/I142401562"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5100401547"],"corresponding_institution_ids":["https://openalex.org/I142401562"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.22586806,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"872","last_page":"873"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/incident-response","display_name":"Incident response","score":0.8019088506698608},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7599168419837952},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6371617317199707},{"id":"https://openalex.org/keywords/information-and-communications-technology","display_name":"Information and Communications Technology","score":0.5853469967842102},{"id":"https://openalex.org/keywords/cyber-space","display_name":"Cyber Space","score":0.5537484884262085},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.518696665763855},{"id":"https://openalex.org/keywords/cyber-crime","display_name":"Cyber crime","score":0.49070775508880615},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.4663507044315338},{"id":"https://openalex.org/keywords/space","display_name":"Space (punctuation)","score":0.4445146322250366},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.3762756884098053},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.12297546863555908},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.07875990867614746}],"concepts":[{"id":"https://openalex.org/C2985105721","wikidata":"https://www.wikidata.org/wiki/Q13479512","display_name":"Incident response","level":2,"score":0.8019088506698608},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7599168419837952},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6371617317199707},{"id":"https://openalex.org/C67363961","wikidata":"https://www.wikidata.org/wiki/Q5268834","display_name":"Information and Communications Technology","level":2,"score":0.5853469967842102},{"id":"https://openalex.org/C2909575446","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyber Space","level":3,"score":0.5537484884262085},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.518696665763855},{"id":"https://openalex.org/C2989129637","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cyber crime","level":3,"score":0.49070775508880615},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.4663507044315338},{"id":"https://openalex.org/C2778572836","wikidata":"https://www.wikidata.org/wiki/Q380933","display_name":"Space (punctuation)","level":2,"score":0.4445146322250366},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.3762756884098053},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.12297546863555908},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.07875990867614746},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ictc.2014.6983317","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ictc.2014.6983317","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 International Conference on Information and Communication Technology Convergence (ICTC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W1494351124","https://openalex.org/W2260732578","https://openalex.org/W3041672727","https://openalex.org/W1999053799","https://openalex.org/W4285325633","https://openalex.org/W2021267842","https://openalex.org/W2606586071","https://openalex.org/W2509341578","https://openalex.org/W4205853301","https://openalex.org/W23436071"],"abstract_inverted_index":{"Recently,":[0],"cyber":[1,78,86],"space":[2],"is":[3,22,47],"regarded":[4],"as":[5],"the":[6,15,52,63,75,83],"second":[7],"real":[8,12],"world":[9],"connected":[10],"in":[11,25],"time.":[13],"Accordingly,":[14],"issue":[16],"related":[17],"security":[18,43],"and":[19,61,81],"incident":[20,79,87],"respond":[21],"being":[23],"magnified":[24],"most":[26],"of":[27,77,85],"ICT":[28,53,64],"dependent":[29],"industries.":[30,54],"However,":[31],"it's":[32],"rarely":[33],"impossible":[34],"for":[35],"organizations":[36],"to":[37,51],"perfectly":[38],"defend":[39],"cyber-attacks":[40],"with":[41,68],"legacy":[42],"solutions.":[44],"This":[45],"problem":[46],"bringing":[48],"new":[49],"challenges":[50],"In":[55],"this":[56,69],"paper,":[57],"we":[58,73],"describe":[59],"why":[60],"how":[62],"industries":[65],"should":[66],"deal":[67],"problem.":[70],"And":[71],"then,":[72],"introduce":[74],"concept":[76],"forensics":[80],"propose":[82],"design":[84],"forensic":[88],"system.":[89]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
