{"id":"https://openalex.org/W2087854100","doi":"https://doi.org/10.1145/2184512.2184518","title":"Evolution of traditional digital forensics in virtualization","display_name":"Evolution of traditional digital forensics in virtualization","publication_year":2012,"publication_date":"2012-03-29","ids":{"openalex":"https://openalex.org/W2087854100","doi":"https://doi.org/10.1145/2184512.2184518","mag":"2087854100"},"language":"en","primary_location":{"id":"doi:10.1145/2184512.2184518","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2184512.2184518","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 50th Annual Southeast Regional Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060634666","display_name":"Juan Carlos Flores Cruz","orcid":null},"institutions":[{"id":"https://openalex.org/I919208787","display_name":"Louisiana Tech University","ror":"https://ror.org/04q9esz89","country_code":"US","type":"education","lineage":["https://openalex.org/I2799628689","https://openalex.org/I919208787"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Juan Carlos Flores Cruz","raw_affiliation_strings":["Louisiana Tech University, Ruston, LA","Louisiana Tech. University, Ruston, LA"],"affiliations":[{"raw_affiliation_string":"Louisiana Tech University, Ruston, LA","institution_ids":["https://openalex.org/I919208787"]},{"raw_affiliation_string":"Louisiana Tech. University, Ruston, LA","institution_ids":["https://openalex.org/I919208787"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050233765","display_name":"Travis Atkison","orcid":"https://orcid.org/0000-0001-7258-7355"},"institutions":[{"id":"https://openalex.org/I919208787","display_name":"Louisiana Tech University","ror":"https://ror.org/04q9esz89","country_code":"US","type":"education","lineage":["https://openalex.org/I2799628689","https://openalex.org/I919208787"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Travis Atkison","raw_affiliation_strings":["Louisiana Tech University, Ruston, LA","Louisiana Tech. University, Ruston, LA"],"affiliations":[{"raw_affiliation_string":"Louisiana Tech University, Ruston, LA","institution_ids":["https://openalex.org/I919208787"]},{"raw_affiliation_string":"Louisiana Tech. University, Ruston, LA","institution_ids":["https://openalex.org/I919208787"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5060634666"],"corresponding_institution_ids":["https://openalex.org/I919208787"],"apc_list":null,"apc_paid":null,"fwci":1.2242,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.83009771,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"18","last_page":"23"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.880321741104126},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7729359865188599},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.7650198936462402},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.7567121982574463},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.7294960618019104},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6259540319442749},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.5393602252006531},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5113427042961121},{"id":"https://openalex.org/keywords/hardware-virtualization","display_name":"Hardware virtualization","score":0.4824555516242981},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4611726999282837},{"id":"https://openalex.org/keywords/application-virtualization","display_name":"Application virtualization","score":0.45048969984054565},{"id":"https://openalex.org/keywords/full-virtualization","display_name":"Full virtualization","score":0.40600013732910156},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.3373357057571411},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3232617974281311}],"concepts":[{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.880321741104126},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7729359865188599},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.7650198936462402},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.7567121982574463},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.7294960618019104},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6259540319442749},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.5393602252006531},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5113427042961121},{"id":"https://openalex.org/C68793194","wikidata":"https://www.wikidata.org/wiki/Q1616095","display_name":"Hardware virtualization","level":5,"score":0.4824555516242981},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4611726999282837},{"id":"https://openalex.org/C13062989","wikidata":"https://www.wikidata.org/wiki/Q651531","display_name":"Application virtualization","level":5,"score":0.45048969984054565},{"id":"https://openalex.org/C47878483","wikidata":"https://www.wikidata.org/wiki/Q848333","display_name":"Full virtualization","level":4,"score":0.40600013732910156},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.3373357057571411},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3232617974281311}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2184512.2184518","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2184512.2184518","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 50th Annual Southeast Regional Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G650455502","display_name":null,"funder_award_id":"FA9550-10-1-0289","funder_id":"https://openalex.org/F4320338294","funder_display_name":"Air Force Research Laboratory"}],"funders":[{"id":"https://openalex.org/F4320338294","display_name":"Air Force Research Laboratory","ror":"https://ror.org/02e2egq70"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W115995810","https://openalex.org/W1492484099","https://openalex.org/W1493144261","https://openalex.org/W1522250664","https://openalex.org/W1641762327","https://openalex.org/W1813040609","https://openalex.org/W2048997531","https://openalex.org/W2100940060","https://openalex.org/W2126470082","https://openalex.org/W2138072040","https://openalex.org/W2138525936","https://openalex.org/W2138580357","https://openalex.org/W2155750598","https://openalex.org/W2155877710","https://openalex.org/W2156961229","https://openalex.org/W2159265516","https://openalex.org/W2168735232","https://openalex.org/W2171734144","https://openalex.org/W2183802064","https://openalex.org/W2494899919","https://openalex.org/W2734941459","https://openalex.org/W4232895233"],"related_works":["https://openalex.org/W2021257679","https://openalex.org/W2106040863","https://openalex.org/W2134071009","https://openalex.org/W137788609","https://openalex.org/W4256146708","https://openalex.org/W1606290493","https://openalex.org/W759120778","https://openalex.org/W2608663509","https://openalex.org/W2462146643","https://openalex.org/W2941645671"],"abstract_inverted_index":{"Computer":[0],"virtualization":[1,43,103,140],"is":[2,181],"not":[3,232],"new;":[4],"however,":[5],"it":[6,16,47,221],"has":[7,104,212],"become":[8,150],"increasingly":[9],"important":[10],"because":[11],"of":[12,102,112,135,138,160,183,191,194,200],"the":[13,96,99,106,136,158,189,198,218],"many":[14],"advantages":[15],"offers":[17,44],"businesses":[18],"and":[19,30,72,78,163,203,217],"individuals":[20],"to":[21,51,67,84,122,144,156,167,171,214,234],"reduce":[22,27],"costs.":[23],"A":[24],"company":[25],"can":[26],"maintenance,":[28],"hardware,":[29],"energy":[31],"costs":[32],"by":[33,70],"running":[34],"virtualized":[35,86,175],"servers":[36],"on":[37],"a":[38,109,192],"single":[39],"physical":[40,93],"machine.":[41],"Although":[42],"these":[45,125,147,184],"advantages,":[46],"introduces":[48],"new":[49,110,142,169,219],"challenges":[50,220],"current":[52,161],"computer":[53,59,113,119],"forensic":[54,120,162],"techniques":[55,121,143,153,185,230],"as":[56,58,88,116,118],"well":[57,117],"system":[60,114,164],"defense":[61,165],"tools.":[62],"As":[63],"this":[64,206],"technology":[65],"continues":[66],"be":[68],"adopted":[69],"more":[71,73],"companies":[74],"every":[75],"year,":[76],"malware":[77],"hacker":[79],"attacks":[80],"are":[81,231],"potentially":[82],"going":[83],"affect":[85],"systems":[87,94,126,148],"they":[89,130,239],"have":[90,131,149,187,240],"been":[91,132,241],"affecting":[92],"in":[95,197],"past.":[97],"Therefore,":[98],"increasing":[100],"growth":[101],"created":[105],"need":[107],"for":[108],"generation":[111],"defenses":[115],"effectively":[123],"defend":[124,172],"before":[127],"or":[128,173],"after":[129],"attacked.":[133,242],"Because":[134],"nature":[137],"how":[139],"operates,":[141],"interact":[145],"with":[146],"available.":[151],"These":[152],"allow":[154],"us":[155],"increase":[157],"effectiveness":[159],"tools":[166,170],"create":[168],"analyze":[174,235],"systems.":[176],"Virtual":[177],"Machine":[178],"Introspection":[179],"(VMI)":[180],"one":[182],"that":[186],"formed":[188],"basis":[190],"number":[193],"novel":[195],"approaches":[196],"field":[199],"Digital":[201,215,228],"Forensics":[202,216],"Cybersecurity.":[204],"In":[205],"paper,":[207],"we":[208,224],"present":[209],"what":[210],"VMI":[211],"offered":[213],"brings.":[222],"Likewise,":[223],"discuss":[225],"why":[226],"traditional":[227],"Forensic":[229],"reliable":[233],"virtual":[236],"machines":[237],"once":[238]},"counts_by_year":[{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
