{"id":"https://openalex.org/W2967342615","doi":"https://doi.org/10.1145/3339252.3339278","title":"Language-based Integration of Digital Forensics &amp; Incident Response","display_name":"Language-based Integration of Digital Forensics &amp; Incident Response","publication_year":2019,"publication_date":"2019-08-09","ids":{"openalex":"https://openalex.org/W2967342615","doi":"https://doi.org/10.1145/3339252.3339278","mag":"2967342615"},"language":"en","primary_location":{"id":"doi:10.1145/3339252.3339278","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3339252.3339278","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062739717","display_name":"Christopher Stelly","orcid":null},"institutions":[{"id":"https://openalex.org/I192396691","display_name":"University of New Orleans","ror":"https://ror.org/034mtvk83","country_code":"US","type":"education","lineage":["https://openalex.org/I192396691","https://openalex.org/I2799628689"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Christopher Stelly","raw_affiliation_strings":["University of New Orleans, United States"],"affiliations":[{"raw_affiliation_string":"University of New Orleans, United States","institution_ids":["https://openalex.org/I192396691"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019922169","display_name":"Vassil Roussev","orcid":null},"institutions":[{"id":"https://openalex.org/I192396691","display_name":"University of New Orleans","ror":"https://ror.org/034mtvk83","country_code":"US","type":"education","lineage":["https://openalex.org/I192396691","https://openalex.org/I2799628689"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vassil Roussev","raw_affiliation_strings":["University of New Orleans, United States"],"affiliations":[{"raw_affiliation_string":"University of New Orleans, United States","institution_ids":["https://openalex.org/I192396691"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5062739717"],"corresponding_institution_ids":["https://openalex.org/I192396691"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.12347806,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.8067535161972046},{"id":"https://openalex.org/keywords/standardization","display_name":"Standardization","score":0.7140635251998901},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6945663690567017},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6618955135345459},{"id":"https://openalex.org/keywords/visibility","display_name":"Visibility","score":0.624123752117157},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.5929267406463623},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5357508063316345},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.4932093024253845},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.4864639937877655},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.4371088743209839},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.22850301861763}],"concepts":[{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.8067535161972046},{"id":"https://openalex.org/C188087704","wikidata":"https://www.wikidata.org/wiki/Q369577","display_name":"Standardization","level":2,"score":0.7140635251998901},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6945663690567017},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6618955135345459},{"id":"https://openalex.org/C123403432","wikidata":"https://www.wikidata.org/wiki/Q654068","display_name":"Visibility","level":2,"score":0.624123752117157},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.5929267406463623},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5357508063316345},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.4932093024253845},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.4864639937877655},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4371088743209839},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.22850301861763},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3339252.3339278","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3339252.3339278","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6299999952316284,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W2012414703","https://openalex.org/W2021847877","https://openalex.org/W2026546793","https://openalex.org/W2071030167","https://openalex.org/W2116256634","https://openalex.org/W2590158836","https://openalex.org/W2793724466"],"related_works":["https://openalex.org/W2378767206","https://openalex.org/W1540871478","https://openalex.org/W328308450","https://openalex.org/W282641168","https://openalex.org/W2376963063","https://openalex.org/W2066396794","https://openalex.org/W2366734808","https://openalex.org/W2002476357","https://openalex.org/W2391444248","https://openalex.org/W2390716080"],"abstract_inverted_index":{"In":[0],"the":[1,4,54,66],"cybersecurity":[2,11],"domain,":[3],"level":[5],"of":[6,56,68],"standardization":[7],"and":[8,33,42,60,63,71],"interoperability":[9],"among":[10],"products":[12],"from":[13,24],"different":[14],"vendors,":[15],"including":[16],"open-source":[17],"ones,":[18],"is":[19],"fairly":[20],"low.":[21],"Although":[22],"understandable":[23],"a":[25],"business":[26],"perspective,":[27],"this":[28],"deficiency":[29],"makes":[30],"it":[31],"difficult":[32],"expensive":[34],"for":[35],"analysts":[36],"to":[37,43],"put":[38],"together":[39],"custom":[40,57],"solutions":[41],"have":[44],"visibility":[45],"across":[46],"their":[47],"entire":[48],"IT":[49],"infrastructure.":[50],"It":[51],"also":[52],"hampers":[53],"adoption":[55],"data":[58],"analytics":[59],"AI":[61],"solutions,":[62],"slows":[64],"down":[65],"exchange":[67],"threat":[69],"detection":[70],"mitigation":[72],"solutions.":[73]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
