{"id":"https://openalex.org/W1980532429","doi":"https://doi.org/10.1109/sadfe.2013.6911547","title":"Quantification of digital forensic hypotheses using probability theory","display_name":"Quantification of digital forensic hypotheses using probability theory","publication_year":2013,"publication_date":"2013-11-01","ids":{"openalex":"https://openalex.org/W1980532429","doi":"https://doi.org/10.1109/sadfe.2013.6911547","mag":"1980532429"},"language":"en","primary_location":{"id":"doi:10.1109/sadfe.2013.6911547","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sadfe.2013.6911547","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003935929","display_name":"Richard E. Overill","orcid":"https://orcid.org/0000-0002-5943-1812"},"institutions":[{"id":"https://openalex.org/I183935753","display_name":"King's College London","ror":"https://ror.org/0220mzb33","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I183935753"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Richard E Overill","raw_affiliation_strings":["Department of Informatics, King's College London, London, UK","Department of Informatics, King's College London, Strand, WC2R 2LS, UK"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, King's College London, London, UK","institution_ids":["https://openalex.org/I183935753"]},{"raw_affiliation_string":"Department of Informatics, King's College London, Strand, WC2R 2LS, UK","institution_ids":["https://openalex.org/I183935753"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090251504","display_name":"Jantje Silomon","orcid":null},"institutions":[{"id":"https://openalex.org/I183935753","display_name":"King's College London","ror":"https://ror.org/0220mzb33","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I183935753"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Jantje A M Silomon","raw_affiliation_strings":["Department of Informatics, King's College London, London, UK","Department of Informatics, King's College London, Strand, WC2R 2LS, UK"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, King's College London, London, UK","institution_ids":["https://openalex.org/I183935753"]},{"raw_affiliation_string":"Department of Informatics, King's College London, Strand, WC2R 2LS, UK","institution_ids":["https://openalex.org/I183935753"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102173312","display_name":"Kam-Pui Chow","orcid":null},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Kam-Pui Chow","raw_affiliation_strings":["Department of Computer Science, University of Hong Kong, Hong Kong","Department of Computer Science, University of Hong Kong, Pokfulam Road, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I889458895"]},{"raw_affiliation_string":"Department of Computer Science, University of Hong Kong, Pokfulam Road, Hong Kong","institution_ids":["https://openalex.org/I889458895"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042230529","display_name":"Hayson Tse","orcid":"https://orcid.org/0000-0001-9056-5395"},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Hayson Tse","raw_affiliation_strings":["Department of Computer Science, University of Hong Kong, Hong Kong","Department of Computer Science, University of Hong Kong, Pokfulam Road, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I889458895"]},{"raw_affiliation_string":"Department of Computer Science, University of Hong Kong, Pokfulam Road, Hong Kong","institution_ids":["https://openalex.org/I889458895"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5003935929"],"corresponding_institution_ids":["https://openalex.org/I183935753"],"apc_list":null,"apc_paid":null,"fwci":0.8089,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.81302696,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"21","issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/child-pornography","display_name":"Child pornography","score":0.863304853439331},{"id":"https://openalex.org/keywords/possession","display_name":"Possession (linguistics)","score":0.8263006210327148},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.7907923460006714},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.6862702369689941},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5744919776916504},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.5333094000816345},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.5096237659454346},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48164811730384827},{"id":"https://openalex.org/keywords/pornography","display_name":"Pornography","score":0.45482614636421204},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.413252592086792},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.30047911405563354},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2602335810661316},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.22266170382499695},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.15031397342681885},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.06707599759101868}],"concepts":[{"id":"https://openalex.org/C2777154746","wikidata":"https://www.wikidata.org/wiki/Q660567","display_name":"Child pornography","level":3,"score":0.863304853439331},{"id":"https://openalex.org/C2780193096","wikidata":"https://www.wikidata.org/wiki/Q3543662","display_name":"Possession (linguistics)","level":2,"score":0.8263006210327148},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.7907923460006714},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.6862702369689941},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5744919776916504},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.5333094000816345},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.5096237659454346},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48164811730384827},{"id":"https://openalex.org/C2781301322","wikidata":"https://www.wikidata.org/wiki/Q291","display_name":"Pornography","level":2,"score":0.45482614636421204},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.413252592086792},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.30047911405563354},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2602335810661316},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.22266170382499695},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.15031397342681885},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.06707599759101868},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/sadfe.2013.6911547","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sadfe.2013.6911547","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE)","raw_type":"proceedings-article"},{"id":"pmh:oai:hub.hku.hk:10722/203655","is_oa":false,"landing_page_url":"http://hdl.handle.net/10722/203655","pdf_url":null,"source":{"id":"https://openalex.org/S4377196271","display_name":"The HKU Scholars Hub (University of Hong Kong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I889458895","host_organization_name":"University of Hong Kong","host_organization_lineage":["https://openalex.org/I889458895"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference_Paper"},{"id":"pmh:oai:kclpure.kcl.ac.uk:publications/ae340c02-50c7-4f4d-aa3b-e1d3e8f94bc5","is_oa":false,"landing_page_url":"http://www.scopus.com/inward/record.url?scp=84910050971&partnerID=8YFLogxK","pdf_url":null,"source":{"id":"https://openalex.org/S4306400216","display_name":"Research Portal (King's College London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I183935753","host_organization_name":"King's College London","host_organization_lineage":["https://openalex.org/I183935753"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Overill, R E, Silomon, J A M, Chow, K P & Tse, H 2014, Quantification of digital forensic hypotheses using probability theory. in Int. Workshop Syst. Approaches Digit. Forensics Eng., SADFE., 6911547, 2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering, SADFE 2013, Hong Kong, Hong Kong, 21/11/2013. https://doi.org/10.1109/SADFE.2013.6911547","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6000000238418579,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1493379994","https://openalex.org/W1495157215","https://openalex.org/W1527818657","https://openalex.org/W1974323608","https://openalex.org/W1978218491","https://openalex.org/W2009316616","https://openalex.org/W2015855479","https://openalex.org/W2040484452","https://openalex.org/W2095817904","https://openalex.org/W2099926639","https://openalex.org/W2102744686","https://openalex.org/W2111928617","https://openalex.org/W2120062331","https://openalex.org/W2139915177","https://openalex.org/W2216382204","https://openalex.org/W2269303507","https://openalex.org/W2397235658","https://openalex.org/W2484922912","https://openalex.org/W4246941695","https://openalex.org/W6712381738","https://openalex.org/W6828859756"],"related_works":["https://openalex.org/W1547734371","https://openalex.org/W4378232294","https://openalex.org/W3123697958","https://openalex.org/W2181728705","https://openalex.org/W583064430","https://openalex.org/W4238452393","https://openalex.org/W2489557937","https://openalex.org/W4247205791","https://openalex.org/W2167366752","https://openalex.org/W2901725359"],"abstract_inverted_index":{"The":[0,55],"issue":[1],"of":[2,19,65],"downloading":[3],"illegal":[4,47],"material":[5,48],"from":[6,16],"a":[7,10,29],"website":[8],"onto":[9],"personal":[11],"digital":[12],"device":[13],"is":[14,57],"considered":[15],"the":[17,39,44,53],"perspective":[18],"conventional":[20],"(Pascalian)":[21],"probability":[22],"theory.":[23],"We":[24],"present":[25],"quantitative":[26],"results":[27],"for":[28],"simple":[30],"model":[31,56],"system":[32],"by":[33,52],"which":[34],"we":[35],"analyse":[36],"and":[37],"counter":[38],"putative":[40],"defence":[41],"case":[42],"that":[43],"forensically":[45],"recovered":[46],"was":[49],"downloaded":[50],"accidentally":[51],"defendant.":[54],"applied":[58],"to":[59],"two":[60],"actual":[61],"prosecutions":[62],"involving":[63],"possession":[64],"child":[66],"pornography.":[67]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
