{"id":"https://openalex.org/W2929984988","doi":"https://doi.org/10.1109/msec.2019.2896857","title":"Recent Advancements in Digital Forensics, Part 2","display_name":"Recent Advancements in Digital Forensics, Part 2","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2929984988","doi":"https://doi.org/10.1109/msec.2019.2896857","mag":"2929984988"},"language":"en","primary_location":{"id":"doi:10.1109/msec.2019.2896857","is_oa":true,"landing_page_url":"https://doi.org/10.1109/msec.2019.2896857","pdf_url":"https://ieeexplore.ieee.org/ielx7/8013/8674035/08674170.pdf","source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://ieeexplore.ieee.org/ielx7/8013/8674035/08674170.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089469997","display_name":"Wojciech Mazurczyk","orcid":"https://orcid.org/0000-0002-8509-4127"},"institutions":[{"id":"https://openalex.org/I108403487","display_name":"Warsaw University of Technology","ror":"https://ror.org/00y0xnp53","country_code":"PL","type":"education","lineage":["https://openalex.org/I108403487"]},{"id":"https://openalex.org/I4210155236","display_name":"National Research Council","ror":"https://ror.org/04zaypm56","country_code":"IT","type":"funder","lineage":["https://openalex.org/I4210155236"]}],"countries":["IT","PL"],"is_corresponding":true,"raw_author_name":"Wojciech Mazurczyk","raw_affiliation_strings":["Warsaw University of Technology","| Warsaw University of Technology Luca Caviglione | National Research Council of Italy Steffen Wendzel | Worms University of Applied Sciences"],"affiliations":[{"raw_affiliation_string":"Warsaw University of Technology","institution_ids":["https://openalex.org/I108403487"]},{"raw_affiliation_string":"| Warsaw University of Technology Luca Caviglione | National Research Council of Italy Steffen Wendzel | Worms University of Applied Sciences","institution_ids":["https://openalex.org/I4210155236"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082854095","display_name":"Luca Caviglione","orcid":"https://orcid.org/0000-0001-6466-3354"},"institutions":[{"id":"https://openalex.org/I4210155236","display_name":"National Research Council","ror":"https://ror.org/04zaypm56","country_code":"IT","type":"funder","lineage":["https://openalex.org/I4210155236"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Luca Caviglione","raw_affiliation_strings":["Institute for Applied Mathematics and Information Technologies, National Research Council of Italy"],"affiliations":[{"raw_affiliation_string":"Institute for Applied Mathematics and Information Technologies, National Research Council of Italy","institution_ids":["https://openalex.org/I4210155236"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072118587","display_name":"Steffen Wendzel","orcid":"https://orcid.org/0000-0002-1913-5912"},"institutions":[{"id":"https://openalex.org/I151001649","display_name":"University of Applied Sciences Worms","ror":"https://ror.org/031ph8d53","country_code":"DE","type":"education","lineage":["https://openalex.org/I151001649"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Steffen Wendzel","raw_affiliation_strings":["Worms University of Applied Sciences"],"affiliations":[{"raw_affiliation_string":"Worms University of Applied Sciences","institution_ids":["https://openalex.org/I151001649"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5089469997"],"corresponding_institution_ids":["https://openalex.org/I108403487","https://openalex.org/I4210155236"],"apc_list":null,"apc_paid":null,"fwci":0.2024,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.51460746,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"17","issue":"1","first_page":"7","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.8491385579109192},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.7342116236686707},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.730862021446228},{"id":"https://openalex.org/keywords/digital-evidence","display_name":"Digital evidence","score":0.6729650497436523},{"id":"https://openalex.org/keywords/multidisciplinary-approach","display_name":"Multidisciplinary approach","score":0.667085587978363},{"id":"https://openalex.org/keywords/criminal-justice","display_name":"Criminal justice","score":0.5660079717636108},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5052548050880432},{"id":"https://openalex.org/keywords/criminal-investigation","display_name":"Criminal investigation","score":0.4923645257949829},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46524369716644287},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.45140138268470764},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.4279100298881531},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.39318615198135376},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.33635658025741577},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.19208472967147827}],"concepts":[{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.8491385579109192},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.7342116236686707},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.730862021446228},{"id":"https://openalex.org/C2781357168","wikidata":"https://www.wikidata.org/wiki/Q5276084","display_name":"Digital evidence","level":3,"score":0.6729650497436523},{"id":"https://openalex.org/C22467394","wikidata":"https://www.wikidata.org/wiki/Q849359","display_name":"Multidisciplinary approach","level":2,"score":0.667085587978363},{"id":"https://openalex.org/C102587632","wikidata":"https://www.wikidata.org/wiki/Q117488","display_name":"Criminal justice","level":2,"score":0.5660079717636108},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5052548050880432},{"id":"https://openalex.org/C117660856","wikidata":"https://www.wikidata.org/wiki/Q1964968","display_name":"Criminal investigation","level":2,"score":0.4923645257949829},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46524369716644287},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.45140138268470764},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.4279100298881531},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.39318615198135376},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.33635658025741577},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.19208472967147827}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/msec.2019.2896857","is_oa":true,"landing_page_url":"https://doi.org/10.1109/msec.2019.2896857","pdf_url":"https://ieeexplore.ieee.org/ielx7/8013/8674035/08674170.pdf","source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy","raw_type":"journal-article"},{"id":"pmh:oai:fraunhofer.de:N-541173","is_oa":false,"landing_page_url":"http://publica.fraunhofer.de/documents/N-541173.html","pdf_url":null,"source":{"id":"https://openalex.org/S4306400801","display_name":"Publikationsdatenbank der Fraunhofer-Gesellschaft (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Fraunhofer FKIE","raw_type":"Journal Article"},{"id":"pmh:oai:publica.fraunhofer.de:publica/257382","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/257382","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"journal article"}],"best_oa_location":{"id":"doi:10.1109/msec.2019.2896857","is_oa":true,"landing_page_url":"https://doi.org/10.1109/msec.2019.2896857","pdf_url":"https://ieeexplore.ieee.org/ielx7/8013/8674035/08674170.pdf","source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7099999785423279}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2929984988.pdf","grobid_xml":"https://content.openalex.org/works/W2929984988.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2598491911","https://openalex.org/W2181728705","https://openalex.org/W4247205791","https://openalex.org/W4242633011","https://openalex.org/W4283205458","https://openalex.org/W2489557937","https://openalex.org/W4238452393","https://openalex.org/W2536999591","https://openalex.org/W2620272321","https://openalex.org/W54587564"],"abstract_inverted_index":{"Today,":[0],"digital":[1,63,71],"forensics":[2],"experts":[3],"must":[4],"operate":[5],"in":[6,76],"a":[7],"multidisciplinary":[8],"environment":[9],"that":[10,84],"requires":[11],"mastery":[12],"of":[13,79],"many":[14],"disciplines,":[15],"including":[16],"law,":[17],"computer":[18],"science,":[19],"finance,":[20],"networking,":[21],"data":[22],"mining,":[23],"and":[24,45,50,59,90],"criminal":[25,82],"justice.":[26],"Meanwhile,":[27],"cybercriminal":[28],"activities":[29,60,72],"often":[30,74],"compel":[31],"law-enforcement":[32],"agencies":[33],"to":[34,62,69,88],"investigate":[35],"across":[36],"international":[37],"borders,":[38],"which":[39],"means":[40],"dealing":[41],"with":[42,92],"different":[43],"jurisdictions":[44],"legal":[46],"systems.":[47],"Also,":[48],"computing":[49],"networking":[51],"infrastructures":[52],"are":[53,73],"increasingly":[54],"intricate,":[55],"further":[56],"complicating":[57],"investigations":[58],"related":[61],"forensics.":[64],"For":[65],"instance,":[66],"clues":[67],"pointing":[68],"illegal":[70],"buried":[75],"large":[77],"volumes":[78],"data,":[80],"making":[81],"activity":[83],"much":[85],"more":[86],"difficult":[87],"detect":[89],"document":[91],"suitable":[93],"evidence.":[94]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2019-04-11T00:00:00"}
