{"id":"https://openalex.org/W1967867046","doi":"https://doi.org/10.1109/pst.2010.5593243","title":"Achieving critical infrastructure protection through the interaction of computer security and network forensics","display_name":"Achieving critical infrastructure protection through the interaction of computer security and network forensics","publication_year":2010,"publication_date":"2010-08-01","ids":{"openalex":"https://openalex.org/W1967867046","doi":"https://doi.org/10.1109/pst.2010.5593243","mag":"1967867046"},"language":"en","primary_location":{"id":"doi:10.1109/pst.2010.5593243","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst.2010.5593243","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Eighth International Conference on Privacy, Security and Trust","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078626253","display_name":"Ray Hunt","orcid":null},"institutions":[{"id":"https://openalex.org/I185492890","display_name":"University of Canterbury","ror":"https://ror.org/03y7q9t39","country_code":"NZ","type":"education","lineage":["https://openalex.org/I185492890"]}],"countries":["NZ"],"is_corresponding":true,"raw_author_name":"Ray Hunt","raw_affiliation_strings":["Department of Computer Science & Software Engineering, University of Canterbury, Christchurch, New Zealand","Department of Computer Science and Software Engineering University of Canterbury Christchurch New Zealand"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science & Software Engineering, University of Canterbury, Christchurch, New Zealand","institution_ids":["https://openalex.org/I185492890"]},{"raw_affiliation_string":"Department of Computer Science and Software Engineering University of Canterbury Christchurch New Zealand","institution_ids":["https://openalex.org/I185492890"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062854609","display_name":"Jill Slay","orcid":"https://orcid.org/0000-0002-2352-8815"},"institutions":[{"id":"https://openalex.org/I170239107","display_name":"University of South Australia","ror":"https://ror.org/01p93h210","country_code":"AU","type":"education","lineage":["https://openalex.org/I170239107"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jill Slay","raw_affiliation_strings":["Division IT Engineering and the Environment, University of South Australia, Australia","Division IT Engineering and the Environment, University of South Australia"],"affiliations":[{"raw_affiliation_string":"Division IT Engineering and the Environment, University of South Australia, Australia","institution_ids":["https://openalex.org/I170239107"]},{"raw_affiliation_string":"Division IT Engineering and the Environment, University of South Australia","institution_ids":["https://openalex.org/I170239107"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5078626253"],"corresponding_institution_ids":["https://openalex.org/I185492890"],"apc_list":null,"apc_paid":null,"fwci":0.6743,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.66191155,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"6","issue":null,"first_page":"23","last_page":"30"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7517791390419006},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7348459959030151},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.6211996078491211},{"id":"https://openalex.org/keywords/network-forensics","display_name":"Network forensics","score":0.6151937246322632},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4981997013092041},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4926047921180725},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4738262891769409},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.46954545378685},{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.4611106216907501},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.4575805068016052},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.4318661093711853},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.42752182483673096},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.4113916754722595},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.41084030270576477},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.4073607921600342},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4051958918571472},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.19847503304481506}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7517791390419006},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7348459959030151},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.6211996078491211},{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.6151937246322632},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4981997013092041},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4926047921180725},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4738262891769409},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.46954545378685},{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.4611106216907501},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.4575805068016052},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.4318661093711853},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.42752182483673096},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.4113916754722595},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.41084030270576477},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.4073607921600342},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4051958918571472},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.19847503304481506},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pst.2010.5593243","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst.2010.5593243","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Eighth International Conference on Privacy, Security and Trust","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.550000011920929,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1681022087","https://openalex.org/W2004302752","https://openalex.org/W2075274226","https://openalex.org/W2083832610","https://openalex.org/W2087263546","https://openalex.org/W2148699919"],"related_works":["https://openalex.org/W4238452393","https://openalex.org/W2489557937","https://openalex.org/W2161391695","https://openalex.org/W3018602826","https://openalex.org/W2480188389","https://openalex.org/W4240498326","https://openalex.org/W4283205458","https://openalex.org/W4385257722","https://openalex.org/W2972427363","https://openalex.org/W2067681493"],"abstract_inverted_index":{"Recent":[0],"years":[1],"have":[2,56,114,129],"seen":[3,57,88,130],"substantial":[4],"development":[5,59],"in":[6,92,143,167,175,199,215],"computer":[7,93,183],"and":[8,33,40,81,101,110,127,152,156,164,173,185,209,222],"network":[9,54,202],"security":[10,126,172,184,194,221],"design.":[11],"This":[12,136],"has":[13,87],"been":[14],"manifested":[15],"as":[16,108],"an":[17],"every":[18],"increasing":[19,49],"range":[20],"of":[21,29,47,60,70,98,112,125,150,231],"new":[22,24,27,37],"protocols,":[23],"encryption":[25],"algorithms,":[26],"methods":[28,97],"authentication,":[30],"smarter":[31],"firewalls":[32],"intrusion":[34],"detection":[35,102],"techniques,":[36],"anti-malware":[38],"products":[39],"many":[41],"more.":[42],"During":[43],"the":[44,58,67,85,123,224,229],"same":[45,225],"period":[46],"time":[48,226],"demands":[50],"for":[51,77,100,106],"more":[52,117],"trustworthy":[53],"infrastructure":[55],"sophisticated":[61],"analysis":[62,187],"tools":[63,76,95],"necessary":[64],"to":[65,169],"meet":[66],"operational":[68],"requirements":[69,230],"law":[71],"enforcement":[72],"agencies.":[73],"These":[74],"include":[75],"e-discovery,":[78],"commercial":[79],"intelligence":[80],"national":[82],"security.":[83],"Thus":[84],"industry":[86],"equally":[89],"significant":[90],"developments":[91],"forensic":[94,186,205],"where":[96],"searching":[99],"of,":[103],"malicious":[104],"activity":[105],"presentation":[107],"evidence":[109],"provision":[111],"trust":[113],"become":[115],"ever":[116],"sophisticated.":[118],"To":[119],"a":[120,189,200,216],"considerable":[121],"degree":[122],"science":[124],"forensics":[128],"both":[131],"rapid":[132],"but":[133],"separate":[134],"developments.":[135],"paper":[137,181],"proposes":[138],"that":[139,193],"there":[140],"are":[141],"areas":[142],"common":[144],"between":[145],"these":[146],"two":[147],"important":[148],"fields":[149],"endeavour":[151],"sets":[153],"out":[154,214],"techniques":[155],"ideas":[157],"which":[158,218],"demonstrate":[159],"how":[160],"they":[161],"can":[162,196,211],"overlap":[163],"work":[165],"together":[166],"order":[168],"provide":[170],"improved":[171],"trustworthiness":[174],"critical":[176],"infrastructures.":[177],"In":[178],"particular":[179],"this":[180],"addresses":[182],"from":[188],"real-time":[190,220],"perspective":[191],"such":[192],"events":[195],"be":[197,212],"monitored":[198],"live":[201],"while":[203],"sound":[204,232],"data":[206],"collection,":[207],"storage":[208],"processing":[210],"carried":[213],"manner":[217],"supports":[219],"at":[223],"still":[227],"meeting":[228],"evidence.":[233]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
