{"id":"https://openalex.org/W4285813812","doi":"https://doi.org/10.1109/iwcmc55113.2022.9825338","title":"Digital Forensic Investigation Framework for Marine Industry","display_name":"Digital Forensic Investigation Framework for Marine Industry","publication_year":2022,"publication_date":"2022-05-30","ids":{"openalex":"https://openalex.org/W4285813812","doi":"https://doi.org/10.1109/iwcmc55113.2022.9825338"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc55113.2022.9825338","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc55113.2022.9825338","pdf_url":null,"source":{"id":"https://openalex.org/S4363605313","display_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052894414","display_name":"Vihara Fernando","orcid":null},"institutions":[{"id":"https://openalex.org/I192365124","display_name":"Sri Lanka Institute of Information Technology","ror":"https://ror.org/00fhk4582","country_code":"LK","type":"education","lineage":["https://openalex.org/I192365124"]}],"countries":["LK"],"is_corresponding":true,"raw_author_name":"Vihara Fernando","raw_affiliation_strings":["Sri Lanka Institute of Information Technology,Faculty of Graduate Studies and Research,Department of Computer Systems Engineering,Malabe,Sri Lanka","Department of Computer Systems Engineering, Faculty of Graduate Studies and Research, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka"],"affiliations":[{"raw_affiliation_string":"Sri Lanka Institute of Information Technology,Faculty of Graduate Studies and Research,Department of Computer Systems Engineering,Malabe,Sri Lanka","institution_ids":["https://openalex.org/I192365124"]},{"raw_affiliation_string":"Department of Computer Systems Engineering, Faculty of Graduate Studies and Research, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka","institution_ids":["https://openalex.org/I192365124"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051462851","display_name":"Amila Senarathne","orcid":"https://orcid.org/0000-0002-3647-6313"},"institutions":[{"id":"https://openalex.org/I192365124","display_name":"Sri Lanka Institute of Information Technology","ror":"https://ror.org/00fhk4582","country_code":"LK","type":"education","lineage":["https://openalex.org/I192365124"]}],"countries":["LK"],"is_corresponding":false,"raw_author_name":"Amila Senarathne","raw_affiliation_strings":["Sri Lanka Institute of Information Technology,Faculty of Graduate Studies and Research,Department of Computer Systems Engineering,Malabe,Sri Lanka","Department of Computer Systems Engineering, Faculty of Graduate Studies and Research, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka"],"affiliations":[{"raw_affiliation_string":"Sri Lanka Institute of Information Technology,Faculty of Graduate Studies and Research,Department of Computer Systems Engineering,Malabe,Sri Lanka","institution_ids":["https://openalex.org/I192365124"]},{"raw_affiliation_string":"Department of Computer Systems Engineering, Faculty of Graduate Studies and Research, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka","institution_ids":["https://openalex.org/I192365124"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5052894414"],"corresponding_institution_ids":["https://openalex.org/I192365124"],"apc_list":null,"apc_paid":null,"fwci":0.1457,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.37195476,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1003","last_page":"1008"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9818000197410583,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11622","display_name":"Maritime Navigation and Safety","score":0.9090999960899353,"subfield":{"id":"https://openalex.org/subfields/2212","display_name":"Ocean Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.7171111106872559},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.681762158870697},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6613180041313171},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.5443186163902283},{"id":"https://openalex.org/keywords/safeguarding","display_name":"Safeguarding","score":0.5153648257255554},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.5084646940231323},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.43641233444213867},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.3520960509777069},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2909806966781616},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23525318503379822},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.20433804392814636}],"concepts":[{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.7171111106872559},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.681762158870697},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6613180041313171},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.5443186163902283},{"id":"https://openalex.org/C2776743756","wikidata":"https://www.wikidata.org/wiki/Q5097921","display_name":"Safeguarding","level":2,"score":0.5153648257255554},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.5084646940231323},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.43641233444213867},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.3520960509777069},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2909806966781616},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23525318503379822},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.20433804392814636},{"id":"https://openalex.org/C159110408","wikidata":"https://www.wikidata.org/wiki/Q121176","display_name":"Nursing","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc55113.2022.9825338","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc55113.2022.9825338","pdf_url":null,"source":{"id":"https://openalex.org/S4363605313","display_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Life below water","score":0.5799999833106995,"id":"https://metadata.un.org/sdg/14"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1671638969","https://openalex.org/W1943508834","https://openalex.org/W1982246970","https://openalex.org/W2160898275","https://openalex.org/W2259735755","https://openalex.org/W2466497565","https://openalex.org/W2515440264","https://openalex.org/W2539443080","https://openalex.org/W2562962425","https://openalex.org/W2584794099","https://openalex.org/W2743760503","https://openalex.org/W2897388593","https://openalex.org/W2914381632","https://openalex.org/W2986219250","https://openalex.org/W2995380071","https://openalex.org/W2997066694","https://openalex.org/W3036007198","https://openalex.org/W3155836195","https://openalex.org/W4255805010","https://openalex.org/W6640457103","https://openalex.org/W6692423131"],"related_works":["https://openalex.org/W2181728705","https://openalex.org/W4238452393","https://openalex.org/W2489557937","https://openalex.org/W4247205791","https://openalex.org/W2167366752","https://openalex.org/W3002268218","https://openalex.org/W2385667210","https://openalex.org/W3001565613","https://openalex.org/W1506329045","https://openalex.org/W72026768"],"abstract_inverted_index":{"A":[0],"massive":[1],"400%":[2],"increase":[3],"of":[4,31,105,116,121,143,153,184],"cyber-attacks":[5],"was":[6,138,162,178],"reported":[7],"in":[8,27,56,91,171],"the":[9,32,64,76,103,114,131,141,158,172,176],"Marine":[10,77,135,173],"industry":[11,174],"since":[12],"February":[13],"2020":[14],"up":[15],"to":[16,37,148,168],"date.":[17],"Experiments":[18],"and":[19,40,53,88,108,146,151,175],"research":[20],"are":[21,48,70],"being":[22],"conducted":[23],"towards":[24],"safeguarding":[25],"data":[26],"various":[28],"technological":[29],"aspects":[30],"marine":[33],"environment":[34],"with":[35,140],"regards":[36],"navigation,":[38],"transportation":[39],"system":[41],"management.":[42],"At":[43],"present,":[44],"generic":[45],"investigation":[46,65,98,123,160],"processes":[47],"developed":[49],"for":[50,75,85,113],"computer":[51],"incidents":[52],"forensic":[54,83,97],"readiness":[55],"this":[57,92],"sector,":[58],"but":[59],"those":[60],"do":[61],"not":[62],"describe":[63],"process":[66,167],"precisely.":[67],"Although":[68],"there":[69],"incident":[71],"analysis":[72],"technologies":[73,142],"implemented":[74,112,139],"environment,":[78],"it":[79],"lacks":[80],"reliable":[81],"digital":[82,96],"tools":[84],"evidence":[86],"extraction":[87],"analysis.":[89],"Therefore,":[90],"research,":[93],"a":[94,109,165],"comprehensive":[95],"framework":[99,161],"is":[100,111],"proposed,":[101],"answering":[102],"issues":[104],"existing":[106,122],"frameworks,":[107],"tool":[110,177],"examination":[115],"navigational":[117],"evidence.":[118],"Forensic":[119],"procedures":[120],"methodologies":[124],"were":[125],"taken":[126],"into":[127],"consideration":[128],"when":[129],"developing":[130],"fusion":[132],"framework.":[133],"The":[134],"Geo":[136],"Navigator":[137],"Machine":[144],"Learning":[145],"Visualization":[147],"evaluate":[149],"geolocations":[150],"paths":[152],"vessels.":[154],"Through":[155],"expert":[156],"analysis,":[157],"proposed":[159],"verified":[163],"as":[164],"suitable":[166],"be":[169],"utilized":[170],"validated":[179],"resulting":[180],"an":[181],"acceptable":[182],"level":[183],"accuracy.":[185]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
