{"id":"https://openalex.org/W4386072372","doi":"https://doi.org/10.1109/smartnets58706.2023.10215536","title":"SATA M.2 on Forensics: Trim Function Effect on Recovering Permanently Deleted Files","display_name":"SATA M.2 on Forensics: Trim Function Effect on Recovering Permanently Deleted Files","publication_year":2023,"publication_date":"2023-07-25","ids":{"openalex":"https://openalex.org/W4386072372","doi":"https://doi.org/10.1109/smartnets58706.2023.10215536"},"language":"en","primary_location":{"id":"doi:10.1109/smartnets58706.2023.10215536","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/smartnets58706.2023.10215536","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Smart Applications, Communications and Networking (SmartNets)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091566364","display_name":"Ruwa F. Abu Hweidi","orcid":null},"institutions":[{"id":"https://openalex.org/I2799716270","display_name":"Palestine Technical University - Kadoorie","ror":"https://ror.org/00cfa1c07","country_code":"PS","type":"education","lineage":["https://openalex.org/I2799716270"]}],"countries":["PS"],"is_corresponding":true,"raw_author_name":"Ruwa F. Abu Hweidi","raw_affiliation_strings":["Palestine Technical University - Kadoorie,College of IT,Dept. of Computer Science,Tulkarem,State of Palestine","Dept. of Computer Science, College of IT, Palestine Technical University - Kadoorie, Tulkarem, State of Palestine"],"affiliations":[{"raw_affiliation_string":"Palestine Technical University - Kadoorie,College of IT,Dept. of Computer Science,Tulkarem,State of Palestine","institution_ids":["https://openalex.org/I2799716270"]},{"raw_affiliation_string":"Dept. of Computer Science, College of IT, Palestine Technical University - Kadoorie, Tulkarem, State of Palestine","institution_ids":["https://openalex.org/I2799716270"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092675708","display_name":"Mahmmoud Jazzar","orcid":null},"institutions":[{"id":"https://openalex.org/I2799716270","display_name":"Palestine Technical University - Kadoorie","ror":"https://ror.org/00cfa1c07","country_code":"PS","type":"education","lineage":["https://openalex.org/I2799716270"]}],"countries":["PS"],"is_corresponding":false,"raw_author_name":"Mahmmoud Jazzar","raw_affiliation_strings":["Palestine Technical University - Kadoorie,College of IT,Dept. of Computer Science,Tulkarem,State of Palestine","Dept. of Computer Science, College of IT, Palestine Technical University - Kadoorie, Tulkarem, State of Palestine"],"affiliations":[{"raw_affiliation_string":"Palestine Technical University - Kadoorie,College of IT,Dept. of Computer Science,Tulkarem,State of Palestine","institution_ids":["https://openalex.org/I2799716270"]},{"raw_affiliation_string":"Dept. of Computer Science, College of IT, Palestine Technical University - Kadoorie, Tulkarem, State of Palestine","institution_ids":["https://openalex.org/I2799716270"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040655055","display_name":"Amna Eleyan","orcid":"https://orcid.org/0000-0002-2025-3027"},"institutions":[{"id":"https://openalex.org/I11983389","display_name":"Manchester Metropolitan University","ror":"https://ror.org/02hstj355","country_code":"GB","type":"education","lineage":["https://openalex.org/I11983389"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Amna Eleyan","raw_affiliation_strings":["Manchester Metropolitan University,Department of Computing and Mathematics,Manchester,UK","Department of Computing and Mathematics, Manchester Metropolitan University, Manchester, UK"],"affiliations":[{"raw_affiliation_string":"Manchester Metropolitan University,Department of Computing and Mathematics,Manchester,UK","institution_ids":["https://openalex.org/I11983389"]},{"raw_affiliation_string":"Department of Computing and Mathematics, Manchester Metropolitan University, Manchester, UK","institution_ids":["https://openalex.org/I11983389"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079374330","display_name":"Tarek Bejaoui","orcid":"https://orcid.org/0000-0003-2501-8939"},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Tarek Bejaoui","raw_affiliation_strings":["University of Carthage,Computer Engineering Department,Tunisia","Computer Engineering Department, University of Carthage, Tunisia"],"affiliations":[{"raw_affiliation_string":"University of Carthage,Computer Engineering Department,Tunisia","institution_ids":["https://openalex.org/I179097149"]},{"raw_affiliation_string":"Computer Engineering Department, University of Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5091566364"],"corresponding_institution_ids":["https://openalex.org/I2799716270"],"apc_list":null,"apc_paid":null,"fwci":0.4576,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.68339644,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trim","display_name":"Trim","score":0.8160799741744995},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7279950976371765},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.5608580112457275},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5213295817375183},{"id":"https://openalex.org/keywords/file-system","display_name":"File system","score":0.4474744498729706},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.4197956919670105},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3216368556022644},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.2744201123714447}],"concepts":[{"id":"https://openalex.org/C88611116","wikidata":"https://www.wikidata.org/wiki/Q957004","display_name":"Trim","level":2,"score":0.8160799741744995},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7279950976371765},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.5608580112457275},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5213295817375183},{"id":"https://openalex.org/C2780940931","wikidata":"https://www.wikidata.org/wiki/Q174989","display_name":"File system","level":2,"score":0.4474744498729706},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.4197956919670105},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3216368556022644},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.2744201123714447},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smartnets58706.2023.10215536","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/smartnets58706.2023.10215536","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Smart Applications, Communications and Networking (SmartNets)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.4300000071525574,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W24678375","https://openalex.org/W164059470","https://openalex.org/W2110437111","https://openalex.org/W2124326756","https://openalex.org/W2246897765","https://openalex.org/W2497580002","https://openalex.org/W2736101928","https://openalex.org/W2751870118","https://openalex.org/W2808004465","https://openalex.org/W2890142392","https://openalex.org/W3169131131","https://openalex.org/W4207058944","https://openalex.org/W4312779492","https://openalex.org/W4313590956","https://openalex.org/W6601015418","https://openalex.org/W6606630686","https://openalex.org/W6741262191"],"related_works":["https://openalex.org/W753420207","https://openalex.org/W2353896575","https://openalex.org/W2379000728","https://openalex.org/W2368354671","https://openalex.org/W2389631998","https://openalex.org/W2362483455","https://openalex.org/W2355113374","https://openalex.org/W2391476234","https://openalex.org/W37549629","https://openalex.org/W2113429681"],"abstract_inverted_index":{"The":[0,76,90],"spread":[1],"of":[2,5,12,17,28,45,95,107],"different":[3,157],"types":[4,160],"SSD":[6,55],"memory":[7,30,56],"in":[8,53,145],"a":[9,134,137],"wide":[10],"range":[11],"devices":[13],"increases":[14],"the":[15,26,29,34,58,81,86,100,119],"challenge":[16],"cybercrime":[18],"and":[19,32,63,74,105,148,161],"forensic":[20,67],"investigation.":[21],"This":[22,41,117],"is":[23,36,61,78,103,115,133],"due":[24],"to":[25,48,80,125,142,149,153],"features":[27,155],"structure":[31],"how":[33],"data":[35],"recovered":[37,98,111],"under":[38,85,156],"such":[39,69,146],"features.":[40],"research":[42,91],"paper":[43],"consists":[44],"an":[46],"experiment":[47,77],"recover":[49,143],"permanently":[50],"deleted":[51],"files":[52,96,108,144],"SATAM.2":[54],"when-":[57],"Trim":[59,101,113],"function":[60,102,114],"disabled":[62],"permitted":[64],"with":[65],"various":[66,154],"tools":[68],"as":[70],"OSForensics,":[71],"Autopsy,":[72],"FTK":[73],"AXIOM.":[75],"applied":[79],"NTFS":[82],"file":[83,158],"system":[84,159],"Windows":[87],"11":[88],"environment.":[89],"finds":[92],"that":[93,139],"0%":[94],"are":[97],"when":[99],"enabled":[104],"100%":[106],"can":[109],"be":[110],"if":[112],"disabled.":[116],"makes":[118],"recovery":[120],"process":[121],"difficult":[122],"for":[123,136],"investigators":[124,141],"find":[126],"valid":[127],"evidence.":[128],"In":[129],"future":[130],"work,":[131],"there":[132],"need":[135],"method":[138],"allows":[140],"conditions,":[147],"apply":[150],"more":[151],"experiments":[152],"operating":[162],"systems.":[163]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
