{"id":"https://openalex.org/W3036854345","doi":"https://doi.org/10.1109/isdfs49300.2020.9116375","title":"A Conceptual Framework for Database Anti-forensics Impact Mitigation","display_name":"A Conceptual Framework for Database Anti-forensics Impact Mitigation","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3036854345","doi":"https://doi.org/10.1109/isdfs49300.2020.9116375","mag":"3036854345"},"language":"en","primary_location":{"id":"doi:10.1109/isdfs49300.2020.9116375","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isdfs49300.2020.9116375","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112624817","display_name":"Adamu Bashir","orcid":"https://orcid.org/0000-0003-0588-7897"},"institutions":[{"id":"https://openalex.org/I143396566","display_name":"F\u0131rat University","ror":"https://ror.org/05teb7b63","country_code":"TR","type":"education","lineage":["https://openalex.org/I143396566"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Bashir Zak Adamu","raw_affiliation_strings":["Digital Forensics Engineering, Firat University, Elazig, Turkey"],"affiliations":[{"raw_affiliation_string":"Digital Forensics Engineering, Firat University, Elazig, Turkey","institution_ids":["https://openalex.org/I143396566"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037649961","display_name":"Murat Karabatak","orcid":"https://orcid.org/0000-0002-6719-7421"},"institutions":[{"id":"https://openalex.org/I143396566","display_name":"F\u0131rat University","ror":"https://ror.org/05teb7b63","country_code":"TR","type":"education","lineage":["https://openalex.org/I143396566"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Murat Karabatak","raw_affiliation_strings":["Software Engineering, Firat University, Elazig, Turkey"],"affiliations":[{"raw_affiliation_string":"Software Engineering, Firat University, Elazig, Turkey","institution_ids":["https://openalex.org/I143396566"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047672864","display_name":"Fatih Ertam","orcid":"https://orcid.org/0000-0002-9736-8068"},"institutions":[{"id":"https://openalex.org/I143396566","display_name":"F\u0131rat University","ror":"https://ror.org/05teb7b63","country_code":"TR","type":"education","lineage":["https://openalex.org/I143396566"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Fatih Ertam","raw_affiliation_strings":["Digital Forensics Engineering, Firat University, Elazig, Turkey"],"affiliations":[{"raw_affiliation_string":"Digital Forensics Engineering, Firat University, Elazig, Turkey","institution_ids":["https://openalex.org/I143396566"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5112624817"],"corresponding_institution_ids":["https://openalex.org/I143396566"],"apc_list":null,"apc_paid":null,"fwci":0.5338,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.73999004,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7115209102630615},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.6248878836631775},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5550661683082581},{"id":"https://openalex.org/keywords/network-forensics","display_name":"Network forensics","score":0.5545326471328735},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.5163594484329224},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5026800632476807},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.46233341097831726},{"id":"https://openalex.org/keywords/taxonomy","display_name":"Taxonomy (biology)","score":0.42324593663215637},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.4185168147087097}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7115209102630615},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.6248878836631775},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5550661683082581},{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.5545326471328735},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.5163594484329224},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5026800632476807},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.46233341097831726},{"id":"https://openalex.org/C58642233","wikidata":"https://www.wikidata.org/wiki/Q8269924","display_name":"Taxonomy (biology)","level":2,"score":0.42324593663215637},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.4185168147087097},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isdfs49300.2020.9116375","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isdfs49300.2020.9116375","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.699999988079071}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W218419718","https://openalex.org/W1678720259","https://openalex.org/W2032571703","https://openalex.org/W2060155568","https://openalex.org/W2064139900","https://openalex.org/W2585198531","https://openalex.org/W2585519145","https://openalex.org/W2767129994","https://openalex.org/W2802885974","https://openalex.org/W2922165811","https://openalex.org/W2960992814","https://openalex.org/W3007797386","https://openalex.org/W3022531948","https://openalex.org/W6608662364"],"related_works":["https://openalex.org/W4238452393","https://openalex.org/W2489557937","https://openalex.org/W2161391695","https://openalex.org/W3018602826","https://openalex.org/W2480188389","https://openalex.org/W4240498326","https://openalex.org/W4283205458","https://openalex.org/W4385257722","https://openalex.org/W2972427363","https://openalex.org/W2067681493"],"abstract_inverted_index":{"The":[0,101],"emergence":[1],"of":[2,7,15,22,75,103,124],"databases":[3],"has":[4,30],"become":[5],"one":[6],"the":[8,13,20,59,71,113,125],"most":[9],"important":[10],"achievements":[11],"in":[12],"field":[14],"software.":[16],"Databases":[17],"are":[18,98],"at":[19,89,121],"core":[21],"information":[23],"systems":[24],"(Online":[25],"and":[26,28,64,73,115,145],"Offline),":[27],"this":[29,104],"fundamentally":[31],"made":[32],"them":[33],"a":[34,130],"target":[35],"for":[36,56,132,147],"malicious":[37,50],"intents":[38],"because":[39],"they":[40,119],"contain":[41],"sensitive":[42],"information.":[43],"Digital":[44],"forensics":[45,87,127],"tends":[46],"to":[47,69,85,92,107],"outwit":[48],"such":[49],"activities":[51],"by":[52],"providing":[53],"provable":[54],"evidence":[55],"prosecution.":[57],"On":[58],"other":[60],"hand,":[61],"criminals":[62],"develop":[63],"promote":[65],"counter":[66,82],"forensic":[67,76],"measures":[68,83],"reduce":[70],"quality":[72],"quantity":[74],"data":[77],"known":[78],"as":[79],"\u201cAnti-forensics\u201d.":[80],"Such":[81],"tend":[84],"jeopardize":[86],"efforts":[88],"all":[90],"stages":[91,123],"ensure":[93],"that":[94],"court":[95],"admissible":[96],"evidences":[97],"not":[99],"acquired.":[100],"aim":[102],"paper":[105],"is":[106],"explore":[108],"database":[109,126,133],"anti-forensics":[110,134],"agents,":[111],"highlight":[112],"challenges":[114],"or":[116],"negative":[117],"effects":[118],"pose":[120],"various":[122],"processes,":[128],"present":[129],"taxonomy":[131],"impacts,":[135],"provide":[136],"recommendations":[137],"on":[138],"how":[139],"these":[140],"impacts":[141],"can":[142],"be":[143],"mitigated,":[144],"directions":[146],"future":[148],"research":[149],"opportunities.":[150]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-25T21:42:39.735039","created_date":"2025-10-10T00:00:00"}
