{"id":"https://openalex.org/W2005695440","doi":"https://doi.org/10.1109/sadfe.2013.6911546","title":"UniTIME: Timestamp interpretation engine for developing unified timelines","display_name":"UniTIME: Timestamp interpretation engine for developing unified timelines","publication_year":2013,"publication_date":"2013-11-01","ids":{"openalex":"https://openalex.org/W2005695440","doi":"https://doi.org/10.1109/sadfe.2013.6911546","mag":"2005695440"},"language":"en","primary_location":{"id":"doi:10.1109/sadfe.2013.6911546","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sadfe.2013.6911546","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113793867","display_name":"Sriram Raghavan","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Sriram Raghavan","raw_affiliation_strings":["Secure Cyber Space","Secure Cyber Space, India"],"affiliations":[{"raw_affiliation_string":"Secure Cyber Space","institution_ids":[]},{"raw_affiliation_string":"Secure Cyber Space, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060599858","display_name":"Huzur Saran","orcid":null},"institutions":[{"id":"https://openalex.org/I68891433","display_name":"Indian Institute of Technology Delhi","ror":"https://ror.org/049tgcd06","country_code":"IN","type":"education","lineage":["https://openalex.org/I68891433"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Huzur Saran","raw_affiliation_strings":["Department of Computer Science & Engineering, IIT Delhi, New Delhi, INDIA","Department of Computer Science and Engineering, IIT Delhi, New Delhi, India#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science & Engineering, IIT Delhi, New Delhi, INDIA","institution_ids":["https://openalex.org/I68891433"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, IIT Delhi, New Delhi, India#TAB#","institution_ids":["https://openalex.org/I68891433"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5113793867"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.15771482,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":"8","issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9839000105857849,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/timeline","display_name":"Timeline","score":0.971886396408081},{"id":"https://openalex.org/keywords/timestamp","display_name":"Timestamp","score":0.9669421315193176},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8028035759925842},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.49580249190330505},{"id":"https://openalex.org/keywords/digital-evidence","display_name":"Digital evidence","score":0.4647955298423767},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.44835880398750305},{"id":"https://openalex.org/keywords/artifact","display_name":"Artifact (error)","score":0.44652700424194336},{"id":"https://openalex.org/keywords/interpretation","display_name":"Interpretation (philosophy)","score":0.4455043375492096},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.4367271363735199},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.38347330689430237},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.329404354095459},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.17718753218650818},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1679764986038208},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1597248911857605},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.0879717767238617}],"concepts":[{"id":"https://openalex.org/C4438859","wikidata":"https://www.wikidata.org/wiki/Q186117","display_name":"Timeline","level":2,"score":0.971886396408081},{"id":"https://openalex.org/C113954288","wikidata":"https://www.wikidata.org/wiki/Q186885","display_name":"Timestamp","level":2,"score":0.9669421315193176},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8028035759925842},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.49580249190330505},{"id":"https://openalex.org/C2781357168","wikidata":"https://www.wikidata.org/wiki/Q5276084","display_name":"Digital evidence","level":3,"score":0.4647955298423767},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.44835880398750305},{"id":"https://openalex.org/C2779010991","wikidata":"https://www.wikidata.org/wiki/Q2720909","display_name":"Artifact (error)","level":2,"score":0.44652700424194336},{"id":"https://openalex.org/C527412718","wikidata":"https://www.wikidata.org/wiki/Q855395","display_name":"Interpretation (philosophy)","level":2,"score":0.4455043375492096},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.4367271363735199},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.38347330689430237},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.329404354095459},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.17718753218650818},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1679764986038208},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1597248911857605},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0879717767238617},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sadfe.2013.6911546","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sadfe.2013.6911546","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1987311960","https://openalex.org/W2015210295","https://openalex.org/W2022877956","https://openalex.org/W2081832566","https://openalex.org/W2191313340"],"related_works":["https://openalex.org/W3194538516","https://openalex.org/W72150896","https://openalex.org/W5341801","https://openalex.org/W2532953905","https://openalex.org/W2548287415","https://openalex.org/W4247205791","https://openalex.org/W2181728705","https://openalex.org/W4288054526","https://openalex.org/W2039441261","https://openalex.org/W3155521256"],"abstract_inverted_index":{"A":[0],"critical":[1],"part":[2],"of":[3,13,18,31,43,49,120,133,183],"many":[4],"computer":[5],"forensic":[6,226],"investigations":[7],"requires":[8],"developing":[9],"a":[10,36,98,117,130,157],"unified":[11,131,158],"timeline":[12,37,132],"activity":[14],"from":[15,26,136,146],"the":[16,19,47,50,81,121,123,143,152,170,174,195,210],"timestamps":[17,51,144],"artifacts":[20,25,224],"involved,":[21],"often":[22],"involving":[23],"digital":[24,125,184,229],"across":[27,92,137,223],"multiple":[28,93,138,147,180],"heterogeneous":[29,148,181],"sources":[30,150,182],"evidence.":[32],"However,":[33],"generating":[34],"such":[35],"comes":[38],"with":[39,173,186,199],"its":[40,166],"own":[41],"set":[42],"challenges,":[44],"especially":[45],"if":[46],"provenance":[48,63,99,153],"is":[52,65,197],"not":[53,66],"accurately":[54,102],"recorded":[55,212],"and":[56,96,107,165,205,228],"tracked":[57],"during":[58,112,225],"an":[59],"investigation.":[60],"When":[61],"sufficient":[62],"information":[64,106,154],"recorded,":[67],"it":[68],"can":[69,217],"result":[70],"in":[71,220],"inconsistent":[72],"or":[73],"ambiguous":[74],"timelines.":[75],"In":[76],"this":[77],"paper,":[78],"we":[79],"propose":[80],"Provenance":[82],"Information":[83],"Model":[84],"to":[85,89,101,155,201],"address":[86],"challenges":[87],"related":[88,110],"timestamp":[90,188,207],"interpretation":[91,189],"time":[94,104,109,203],"zones":[95,204],"present":[97],"structure":[100],"capture":[103],"zone":[105],"validate":[108],"assertions":[111,211],"analysis.":[113],"We":[114,160],"have":[115,161,192],"developed":[116],"prototype":[118,167],"implementation":[119,168],"model,":[122],"UniTIME":[124],"time-lining":[126],"tool,":[127],"which":[128,178],"generates":[129],"events":[134],"derived":[135],"sources.":[139],"Our":[140],"tool":[141],"adjusts":[142],"obtained":[145],"evidence":[149,185],"using":[151,169,214],"generate":[156],"timeline.":[159],"validated":[162],"our":[163,215],"model":[164,196],"dataset":[171],"associated":[172],"DFRWS":[175],"2008":[176],"challenge":[177],"included":[179],"inherent":[187],"challenges.":[190],"Results":[191],"shown":[193],"that":[194],"robust":[198],"respect":[200],"different":[202],"varied":[206],"representations.":[208],"Additionally,":[209],"when":[213],"PIM":[216],"be":[218],"useful":[219],"identifying":[221],"inconsistencies":[222],"analysis":[227],"time-lining.":[230]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
