{"id":"https://openalex.org/W4416924961","doi":"https://doi.org/10.1109/wimob66857.2025.11257556","title":"ForensicsData: A Digital Forensics Dataset for Large Language Models","display_name":"ForensicsData: A Digital Forensics Dataset for Large Language Models","publication_year":2025,"publication_date":"2025-10-20","ids":{"openalex":"https://openalex.org/W4416924961","doi":"https://doi.org/10.1109/wimob66857.2025.11257556"},"language":null,"primary_location":{"id":"doi:10.1109/wimob66857.2025.11257556","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wimob66857.2025.11257556","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 21th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5119946741","display_name":"Youssef Chakir","orcid":null},"institutions":[{"id":"https://openalex.org/I4210153527","display_name":"Institut National des Postes et T\u00e9l\u00e9communications","ror":"https://ror.org/052bnvt46","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210153527","https://openalex.org/I4210167103"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Youssef Chakir","raw_affiliation_strings":["INPT,CS department,Rabat,Morocco"],"affiliations":[{"raw_affiliation_string":"INPT,CS department,Rabat,Morocco","institution_ids":["https://openalex.org/I4210153527"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013490584","display_name":"Iyad Lahsen-Cherif","orcid":"https://orcid.org/0000-0001-5743-377X"},"institutions":[{"id":"https://openalex.org/I4210153527","display_name":"Institut National des Postes et T\u00e9l\u00e9communications","ror":"https://ror.org/052bnvt46","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210153527","https://openalex.org/I4210167103"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Iyad Lahsen-Cherif","raw_affiliation_strings":["INPT,CS department,Rabat,Morocco"],"affiliations":[{"raw_affiliation_string":"INPT,CS department,Rabat,Morocco","institution_ids":["https://openalex.org/I4210153527"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5119946741"],"corresponding_institution_ids":["https://openalex.org/I4210153527"],"apc_list":null,"apc_paid":null,"fwci":3.2307,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.94469719,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.5509999990463257,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.5509999990463257,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.14669999480247498,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12380","display_name":"Authorship Attribution and Profiling","score":0.05700000002980232,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.7773000001907349},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.7515000104904175},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.6988000273704529},{"id":"https://openalex.org/keywords/digital-evidence","display_name":"Digital evidence","score":0.5782999992370605},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5778999924659729},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.478300005197525},{"id":"https://openalex.org/keywords/language-model","display_name":"Language model","score":0.4765999913215637}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8065999746322632},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.7773000001907349},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.7515000104904175},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.6988000273704529},{"id":"https://openalex.org/C2781357168","wikidata":"https://www.wikidata.org/wiki/Q5276084","display_name":"Digital evidence","level":3,"score":0.5782999992370605},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5778999924659729},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.5753999948501587},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.478300005197525},{"id":"https://openalex.org/C137293760","wikidata":"https://www.wikidata.org/wiki/Q3621696","display_name":"Language model","level":2,"score":0.4765999913215637},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.38659998774528503},{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.3596000075340271},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32429999113082886},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.31839999556541443},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.28780001401901245},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.2867000102996826},{"id":"https://openalex.org/C184356942","wikidata":"https://www.wikidata.org/wiki/Q830382","display_name":"Best practice","level":2,"score":0.2750999927520752},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2734000086784363},{"id":"https://openalex.org/C62230096","wikidata":"https://www.wikidata.org/wiki/Q275969","display_name":"Crowdsourcing","level":2,"score":0.26089999079704285},{"id":"https://openalex.org/C2982933515","wikidata":"https://www.wikidata.org/wiki/Q104381823","display_name":"Public access","level":2,"score":0.26080000400543213},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.2549999952316284},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2549000084400177}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wimob66857.2025.11257556","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wimob66857.2025.11257556","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 21th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W4389520670","https://openalex.org/W4389682457","https://openalex.org/W4390704373","https://openalex.org/W4392852527","https://openalex.org/W4392972103","https://openalex.org/W4401991053","https://openalex.org/W4402148303","https://openalex.org/W4402670265","https://openalex.org/W4402683789","https://openalex.org/W4402811916","https://openalex.org/W4404515032","https://openalex.org/W4408177468","https://openalex.org/W4408774828","https://openalex.org/W4412888613","https://openalex.org/W4414535322","https://openalex.org/W4415795469","https://openalex.org/W4415797703"],"related_works":[],"abstract_inverted_index":{"The":[0],"growing":[1],"complexity":[2],"of":[3,25,63],"cyber":[4],"incidents":[5],"presents":[6],"significant":[7],"challenges":[8],"for":[9],"digital":[10,126],"forensic":[11,120],"investigators,":[12],"especially":[13],"in":[14,115],"evidence":[15],"collection":[16],"and":[17,28,40,93,132],"analysis.":[18],"Public":[19],"resources":[20],"are":[21,35],"still":[22],"limited":[23],"because":[24],"ethical,":[26],"legal,":[27],"privacy":[29],"concerns,":[30],"even":[31],"though":[32],"realistic":[33],"datasets":[34],"necessary":[36],"to":[37,74,87,100,124],"support":[38],"research":[39,137],"tool":[41],"developments.":[42],"To":[43],"address":[44],"this":[45],"gap,":[46],"we":[47],"introduce":[48],"ForensicsData,":[49],"an":[50],"extensive":[51],"Question-Context-Answer":[52],"(Q-CA)":[53],"dataset":[54],"sourced":[55],"from":[56],"actual":[57],"malware":[58],"analysis":[59],"reports.":[60],"It":[61],"consists":[62],"more":[64],"than":[65],"5,000":[66],"Q-C-A":[67,91],"triplets.":[68],"A":[69],"unique":[70],"workflow":[71],"was":[72],"used":[73],"create":[75],"the":[76,105,112,136],"dataset,":[77],"which":[78],"extracts":[79],"structured":[80],"data,":[81],"uses":[82,95],"large":[83],"language":[84],"models":[85,106],"(LLMs)":[86],"transform":[88],"it":[89],"into":[90],"format,":[92],"then":[94],"a":[96],"specialized":[97],"evaluation":[98],"process":[99],"confirm":[101],"its":[102],"quality.":[103],"Among":[104],"evaluated,":[107],"Gemini":[108],"2":[109],"Flash":[110],"demonstrated":[111],"best":[113],"performance":[114],"aligning":[116],"generated":[117],"content":[118],"with":[119],"terminology.":[121],"ForensicsData":[122],"aims":[123],"advance":[125],"forensics":[127],"by":[128],"enabling":[129],"reproducible":[130],"experiments":[131],"fostering":[133],"collaboration":[134],"within":[135],"community.":[138]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-31T07:56:22.981413","created_date":"2025-12-02T00:00:00"}
