{"id":"https://openalex.org/W3042803463","doi":"https://doi.org/10.1109/rivf48685.2020.9140739","title":"Forensic analysis of TikTok application to seek digital artifacts on Android smartphone","display_name":"Forensic analysis of TikTok application to seek digital artifacts on Android smartphone","publication_year":2020,"publication_date":"2020-07-15","ids":{"openalex":"https://openalex.org/W3042803463","doi":"https://doi.org/10.1109/rivf48685.2020.9140739","mag":"3042803463"},"language":"en","primary_location":{"id":"doi:10.1109/rivf48685.2020.9140739","is_oa":false,"landing_page_url":"https://doi.org/10.1109/rivf48685.2020.9140739","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 RIVF International Conference on Computing and Communication Technologies (RIVF)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077224072","display_name":"Nghi Hoang Khoa","orcid":"https://orcid.org/0000-0001-6418-4169"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Nghi Hoang Khoa","raw_affiliation_strings":["Information Security Laboratory, University of Information Technology, Ho Chi Minh City, Vietnam"],"affiliations":[{"raw_affiliation_string":"Information Security Laboratory, University of Information Technology, Ho Chi Minh City, Vietnam","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009023958","display_name":"Phan The Duy","orcid":"https://orcid.org/0000-0002-5945-3712"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Phan The Duy","raw_affiliation_strings":["Information Security Laboratory, University of Information Technology, Ho Chi Minh City, Vietnam"],"affiliations":[{"raw_affiliation_string":"Information Security Laboratory, University of Information Technology, Ho Chi Minh City, Vietnam","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059093327","display_name":"Hien Do Hoang","orcid":"https://orcid.org/0000-0001-8475-7075"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hien Do Hoang","raw_affiliation_strings":["Information Security Laboratory, University of Information Technology, Ho Chi Minh City, Vietnam"],"affiliations":[{"raw_affiliation_string":"Information Security Laboratory, University of Information Technology, Ho Chi Minh City, Vietnam","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051168927","display_name":"Do Thi Thu Hien","orcid":"https://orcid.org/0000-0001-9387-7909"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Do Thi Thu Hien","raw_affiliation_strings":["Information Security Laboratory, University of Information Technology, Ho Chi Minh City, Vietnam"],"affiliations":[{"raw_affiliation_string":"Information Security Laboratory, University of Information Technology, Ho Chi Minh City, Vietnam","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045030863","display_name":"Van-Hau Pham","orcid":"https://orcid.org/0000-0003-3147-3356"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Van-Hau Pham","raw_affiliation_strings":["Information Security Laboratory, University of Information Technology, Ho Chi Minh City, Vietnam"],"affiliations":[{"raw_affiliation_string":"Information Security Laboratory, University of Information Technology, Ho Chi Minh City, Vietnam","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5077224072"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":4.1724,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.9484528,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8063812255859375},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6707909107208252},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.636240541934967},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6265812516212463},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5092376470565796},{"id":"https://openalex.org/keywords/china","display_name":"China","score":0.46881532669067383},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.4285559058189392},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37424272298812866},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.35814720392227173},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.09230577945709229}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8063812255859375},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6707909107208252},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.636240541934967},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6265812516212463},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5092376470565796},{"id":"https://openalex.org/C191935318","wikidata":"https://www.wikidata.org/wiki/Q148","display_name":"China","level":2,"score":0.46881532669067383},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.4285559058189392},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37424272298812866},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.35814720392227173},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.09230577945709229},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/rivf48685.2020.9140739","is_oa":false,"landing_page_url":"https://doi.org/10.1109/rivf48685.2020.9140739","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 RIVF International Conference on Computing and Communication Technologies (RIVF)","raw_type":"proceedings-article"},{"id":"mag:3119994758","is_oa":false,"landing_page_url":"https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=202002222205619469","pdf_url":null,"source":{"id":"https://openalex.org/S4306512817","display_name":"IEEE Conference Proceedings","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"IEEE Conference Proceedings","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7599999904632568,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2026808932","https://openalex.org/W2275630689","https://openalex.org/W2569064808","https://openalex.org/W2759774024","https://openalex.org/W3012025721","https://openalex.org/W3123270410"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2165251242","https://openalex.org/W2198066681","https://openalex.org/W1991580985","https://openalex.org/W2067681493","https://openalex.org/W4320801814","https://openalex.org/W2972427363","https://openalex.org/W3134738208","https://openalex.org/W2073008201","https://openalex.org/W2241816416"],"abstract_inverted_index":{"Emerging":[0],"with":[1],"highlight":[2],"features":[3],"as":[4,149],"a":[5,20,100],"global":[6],"phenomenon,":[7],"TikTok":[8,93],"-":[9],"the":[10,48,71,82,86,105,113,117,123],"international":[11],"version":[12],"of":[13,73,85,103,125],"Douyin":[14],"application":[15],"in":[16,44,55,108,116],"China":[17],"market,":[18],"is":[19,138],"social":[21,32,156],"media":[22],"video":[23,33],"app":[24],"for":[25,151],"creating":[26],"and":[27,142],"sharing":[28],"short":[29],"lip-syncing.":[30],"This":[31],"platform":[34,66],"has":[35],"seen":[36],"astounding":[37],"growth":[38],"by":[39,46,92,111,135],"reaching":[40],"1.5":[41],"billion":[42],"users":[43,69],"2019":[45],"capturing":[47],"cultural":[49],"zeitgeist":[50],"among":[51],"teenage":[52],"smartphone":[53],"owners":[54],"unprecedented":[56],"fashion.":[57],"However,":[58],"criminals":[59],"have":[60,132],"been":[61,133],"paid":[62],"attention":[63],"to":[64,140],"this":[65,78],"where":[67],"young":[68],"become":[70],"target":[72],"abusers":[74],"or":[75],"predators.":[76],"In":[77,95],"paper,":[79,118],"we":[80,98],"introduce":[81],"forensic":[83],"analysis":[84],"artifacts":[87,106,145],"left":[88],"on":[89,154],"Android":[90],"phones":[91],"application.":[94,158],"more":[96],"detail,":[97],"indicate":[99],"complete":[101],"description":[102],"all":[104],"obtained":[107],"TikTok.":[109],"Furthermore,":[110],"using":[112],"results":[114],"discussed":[115],"an":[119],"investigator":[120],"can":[121],"rebuild":[122],"list":[124],"followers,":[126],"searching":[127],"keywords,":[128],"favorites,":[129],"messages":[130],"that":[131],"exchanged":[134],"users.":[136],"It":[137],"helpful":[139],"examine":[141],"determine":[143],"which":[144],"could":[146],"be":[147],"considered":[148],"evidence":[150],"criminal":[152],"investigation":[153],"popular":[155],"networking":[157]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":5}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
