{"id":"https://openalex.org/W2056577642","doi":"https://doi.org/10.1145/1868630.1868643","title":"Live forensics framework for wireless sensor nodes using sandboxing","display_name":"Live forensics framework for wireless sensor nodes using sandboxing","publication_year":2010,"publication_date":"2010-10-20","ids":{"openalex":"https://openalex.org/W2056577642","doi":"https://doi.org/10.1145/1868630.1868643","mag":"2056577642"},"language":"en","primary_location":{"id":"doi:10.1145/1868630.1868643","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1868630.1868643","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085885524","display_name":"Aexandros Zaharis","orcid":null},"institutions":[{"id":"https://openalex.org/I145722265","display_name":"University of Thessaly","ror":"https://ror.org/04v4g9h31","country_code":"GR","type":"education","lineage":["https://openalex.org/I145722265"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Aexandros Zaharis","raw_affiliation_strings":["University of Thessaly, Volos, Greece"],"affiliations":[{"raw_affiliation_string":"University of Thessaly, Volos, Greece","institution_ids":["https://openalex.org/I145722265"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070047145","display_name":"Adamantini Martini","orcid":null},"institutions":[{"id":"https://openalex.org/I145722265","display_name":"University of Thessaly","ror":"https://ror.org/04v4g9h31","country_code":"GR","type":"education","lineage":["https://openalex.org/I145722265"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Adamantini I. Martini","raw_affiliation_strings":["University of Thessaly, Volos, Greece"],"affiliations":[{"raw_affiliation_string":"University of Thessaly, Volos, Greece","institution_ids":["https://openalex.org/I145722265"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026506851","display_name":"Leonidas Perlepes","orcid":"https://orcid.org/0000-0002-7083-4161"},"institutions":[{"id":"https://openalex.org/I145722265","display_name":"University of Thessaly","ror":"https://ror.org/04v4g9h31","country_code":"GR","type":"education","lineage":["https://openalex.org/I145722265"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Leonidas Perlepes","raw_affiliation_strings":["University of Thessaly, Volos, Greece"],"affiliations":[{"raw_affiliation_string":"University of Thessaly, Volos, Greece","institution_ids":["https://openalex.org/I145722265"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065041833","display_name":"Georgios Stamoulis","orcid":"https://orcid.org/0000-0001-7248-8197"},"institutions":[{"id":"https://openalex.org/I145722265","display_name":"University of Thessaly","ror":"https://ror.org/04v4g9h31","country_code":"GR","type":"education","lineage":["https://openalex.org/I145722265"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Georgios Stamoulis","raw_affiliation_strings":["University of Thessaly, Volos, Greece"],"affiliations":[{"raw_affiliation_string":"University of Thessaly, Volos, Greece","institution_ids":["https://openalex.org/I145722265"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110473738","display_name":"Panayotis Kikiras","orcid":null},"institutions":[{"id":"https://openalex.org/I145722265","display_name":"University of Thessaly","ror":"https://ror.org/04v4g9h31","country_code":"GR","type":"education","lineage":["https://openalex.org/I145722265"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Panayotis Kikiras","raw_affiliation_strings":["University of Thessaly, Volos, Greece"],"affiliations":[{"raw_affiliation_string":"University of Thessaly, Volos, Greece","institution_ids":["https://openalex.org/I145722265"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5085885524"],"corresponding_institution_ids":["https://openalex.org/I145722265"],"apc_list":null,"apc_paid":null,"fwci":0.66864917,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.68890764,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"70","last_page":"77"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.883015513420105},{"id":"https://openalex.org/keywords/user-space","display_name":"User space","score":0.6039391160011292},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4934169352054596},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4880472421646118},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.48677754402160645},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.48122406005859375},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4699580669403076},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.46657025814056396},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4572025239467621},{"id":"https://openalex.org/keywords/network-forensics","display_name":"Network forensics","score":0.44041332602500916},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4242447316646576},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.4215683341026306},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.3235543668270111}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.883015513420105},{"id":"https://openalex.org/C2775877400","wikidata":"https://www.wikidata.org/wiki/Q1142183","display_name":"User space","level":2,"score":0.6039391160011292},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4934169352054596},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4880472421646118},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.48677754402160645},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.48122406005859375},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4699580669403076},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.46657025814056396},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4572025239467621},{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.44041332602500916},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4242447316646576},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.4215683341026306},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.3235543668270111},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1868630.1868643","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1868630.1868643","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5199999809265137,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1503233088","https://openalex.org/W1515664404","https://openalex.org/W1518306097","https://openalex.org/W1522824317","https://openalex.org/W1543331277","https://openalex.org/W1580417272","https://openalex.org/W1597805936","https://openalex.org/W1602560985","https://openalex.org/W1791023610","https://openalex.org/W1798077826","https://openalex.org/W1859852026","https://openalex.org/W1980280740","https://openalex.org/W1983629106","https://openalex.org/W1996839061","https://openalex.org/W2021904612","https://openalex.org/W2080046856","https://openalex.org/W2099613071","https://openalex.org/W2104068236","https://openalex.org/W2104948281","https://openalex.org/W2110434538","https://openalex.org/W2115175416","https://openalex.org/W2124998280","https://openalex.org/W2146567535","https://openalex.org/W2146924294","https://openalex.org/W2148888468","https://openalex.org/W2161931410","https://openalex.org/W2170793790","https://openalex.org/W2177982799","https://openalex.org/W2294022756","https://openalex.org/W2391873299","https://openalex.org/W4250874986","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2972427363","https://openalex.org/W2121070677","https://openalex.org/W2161391695","https://openalex.org/W4238452393","https://openalex.org/W1500698787","https://openalex.org/W188028618","https://openalex.org/W2489557937","https://openalex.org/W1970399788","https://openalex.org/W4385257722","https://openalex.org/W2111038567"],"abstract_inverted_index":{"Typical":[0],"sensor":[1],"nodes":[2],"are":[3],"resource":[4],"constrained":[5],"devices":[6],"containing":[7],"user":[8,30],"level":[9],"applications,":[10],"operating":[11],"system":[12],"components,":[13],"and":[14,36,86],"device":[15],"drivers":[16],"in":[17,41],"a":[18,34,54],"single":[19],"address":[20,84],"space,":[21],"with":[22],"no":[23],"form":[24],"of":[25,47,64,71,93],"memory":[26,80],"protection.":[27],"A":[28],"malicious":[29,99],"could":[31],"easily":[32],"capture":[33],"node":[35],"tamper":[37],"the":[38,62,69,72,83,91,94,106],"applications":[39,96],"running,":[40],"order":[42],"to":[43,77,89],"perform":[44],"different":[45],"types":[46],"attacks.":[48],"In":[49],"this":[50],"paper,":[51],"we":[52,97],"propose":[53],"remote":[55],"live":[56],"forensics":[57],"protection":[58],"architecture":[59],"that":[60],"prevents":[61],"execution":[63],"tampered":[65],"software":[66],"while":[67,104],"alarming":[68],"owners":[70],"sensors":[73],"network.":[74],"Using":[75],"sandboxing":[76],"restrict":[78],"application":[79],"accesses":[81],"within":[82],"space":[85],"forensic":[87],"techniques":[88],"validate":[90],"authenticity":[92],"running":[95],"prevent":[98],"code":[100],"from":[101],"being":[102],"executed":[103],"specifying":[105],"intrusion.":[107]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
