{"id":"https://openalex.org/W2968761209","doi":"https://doi.org/10.1145/3339252.3340504","title":"IoT Ignorance is Digital Forensics Research Bliss","display_name":"IoT Ignorance is Digital Forensics Research Bliss","publication_year":2019,"publication_date":"2019-08-09","ids":{"openalex":"https://openalex.org/W2968761209","doi":"https://doi.org/10.1145/3339252.3340504","mag":"2968761209"},"language":"en","primary_location":{"id":"doi:10.1145/3339252.3340504","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3339252.3340504","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://digitalcommons.newhaven.edu/electricalcomputerengineering-facpubs/93","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029731147","display_name":"Tina Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I40120149","display_name":"University of Oxford","ror":"https://ror.org/052gg0110","country_code":"GB","type":"education","lineage":["https://openalex.org/I40120149"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Tina Wu","raw_affiliation_strings":["University of Oxford, Oxford, UK"],"affiliations":[{"raw_affiliation_string":"University of Oxford, Oxford, UK","institution_ids":["https://openalex.org/I40120149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068630039","display_name":"Frank Breitinger","orcid":"https://orcid.org/0000-0001-5261-4600"},"institutions":[{"id":"https://openalex.org/I40253897","display_name":"University of New Haven","ror":"https://ror.org/00zm4rq24","country_code":"US","type":"education","lineage":["https://openalex.org/I40253897"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Frank Breitinger","raw_affiliation_strings":["University of New Haven, West Haven, Connecticut"],"affiliations":[{"raw_affiliation_string":"University of New Haven, West Haven, Connecticut","institution_ids":["https://openalex.org/I40253897"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043176147","display_name":"Ibrahim Baggili","orcid":"https://orcid.org/0000-0002-9574-9537"},"institutions":[{"id":"https://openalex.org/I40253897","display_name":"University of New Haven","ror":"https://ror.org/00zm4rq24","country_code":"US","type":"education","lineage":["https://openalex.org/I40253897"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ibrahim Baggili","raw_affiliation_strings":["University of New Haven, West Haven, Connecticut"],"affiliations":[{"raw_affiliation_string":"University of New Haven, West Haven, Connecticut","institution_ids":["https://openalex.org/I40253897"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5029731147"],"corresponding_institution_ids":["https://openalex.org/I40120149"],"apc_list":null,"apc_paid":null,"fwci":3.1666,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.9310903,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"15"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.8059132099151611},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7368525862693787},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.6352083086967468},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6245981454849243},{"id":"https://openalex.org/keywords/network-forensics","display_name":"Network forensics","score":0.5805808305740356},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5359818339347839},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48727190494537354},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.471506267786026},{"id":"https://openalex.org/keywords/digital-evidence","display_name":"Digital evidence","score":0.455496609210968},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.4521489441394806},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.45049750804901123},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.42445066571235657},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.41446876525878906}],"concepts":[{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.8059132099151611},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7368525862693787},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.6352083086967468},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6245981454849243},{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.5805808305740356},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5359818339347839},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48727190494537354},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.471506267786026},{"id":"https://openalex.org/C2781357168","wikidata":"https://www.wikidata.org/wiki/Q5276084","display_name":"Digital evidence","level":3,"score":0.455496609210968},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4521489441394806},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.45049750804901123},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.42445066571235657},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.41446876525878906},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/3339252.3340504","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3339252.3340504","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},{"id":"pmh:oai:digitalcommons.newhaven.edu:electricalcomputerengineering-facpubs-1094","is_oa":true,"landing_page_url":"https://digitalcommons.newhaven.edu/electricalcomputerengineering-facpubs/93","pdf_url":"https://digitalcommons.newhaven.edu/electricalcomputerengineering-facpubs/93","source":{"id":"https://openalex.org/S4377196522","display_name":"Digital Commons - New Heaven (University of New Haven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I40253897","host_organization_name":"University of New Haven","host_organization_lineage":["https://openalex.org/I40253897"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Electrical & Computer Engineering and Computer Science Faculty Publications","raw_type":"text"},{"id":"pmh:oai:uni-augsburg.opus-bayern.de:117580","is_oa":false,"landing_page_url":"https://opus.bibliothek.uni-augsburg.de/opus4/frontdoor/index/index/docId/117580","pdf_url":null,"source":{"id":"https://openalex.org/S4306400930","display_name":"OPUS (Augsburg University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I119916105","host_organization_name":"Augsburg University","host_organization_lineage":["https://openalex.org/I119916105"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"doc-type:conferenceobject"}],"best_oa_location":{"id":"pmh:oai:digitalcommons.newhaven.edu:electricalcomputerengineering-facpubs-1094","is_oa":true,"landing_page_url":"https://digitalcommons.newhaven.edu/electricalcomputerengineering-facpubs/93","pdf_url":"https://digitalcommons.newhaven.edu/electricalcomputerengineering-facpubs/93","source":{"id":"https://openalex.org/S4377196522","display_name":"Digital Commons - New Heaven (University of New Haven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I40253897","host_organization_name":"University of New Haven","host_organization_lineage":["https://openalex.org/I40253897"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Electrical & Computer Engineering and Computer Science Faculty Publications","raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2968761209.pdf"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W1518563014","https://openalex.org/W1525201666","https://openalex.org/W1555036802","https://openalex.org/W1987164007","https://openalex.org/W1994506898","https://openalex.org/W2025597057","https://openalex.org/W2030482452","https://openalex.org/W2044448129","https://openalex.org/W2112138185","https://openalex.org/W2156350103","https://openalex.org/W2399776309","https://openalex.org/W2441194082","https://openalex.org/W2462696620","https://openalex.org/W2525228524","https://openalex.org/W2737879662","https://openalex.org/W2742353928","https://openalex.org/W2743855208","https://openalex.org/W2744140269","https://openalex.org/W2753819858","https://openalex.org/W2784724302","https://openalex.org/W2786407015","https://openalex.org/W2883204063","https://openalex.org/W2883330562","https://openalex.org/W2886221244","https://openalex.org/W2887812007","https://openalex.org/W2892199449","https://openalex.org/W2962923137","https://openalex.org/W2963606273","https://openalex.org/W4251369139"],"related_works":["https://openalex.org/W4238452393","https://openalex.org/W2489557937","https://openalex.org/W3024263644","https://openalex.org/W4240498326","https://openalex.org/W4283205458","https://openalex.org/W2480188389","https://openalex.org/W4391002340","https://openalex.org/W1903637638","https://openalex.org/W3018602826","https://openalex.org/W4281834465"],"abstract_inverted_index":{"Interactions":[0],"with":[1],"IoT":[2,28,38,43,54,72,107,130,156,212,245,258],"devices":[3,131,213],"generates":[4],"vast":[5],"amounts":[6],"of":[7,17,71,80,112,244,257,272],"personal":[8],"data":[9,163,170,183,219,233],"that":[10,56,203],"can":[11],"be":[12,60,153,180,207],"used":[13],"as":[14,31,63],"a":[15,95,110,263,269],"source":[16],"evidence":[18],"in":[19,27,34,53,68,202,238],"digital":[20,113],"investigations.":[21],"Currently,":[22],"there":[23,49],"are":[24,50,121,125,145],"many":[25,51],"challenges":[26],"forensics":[29,55,108,259],"such":[30,62],"the":[32,41,69,87,103,172,204,239,251,255,273,280],"difficulty":[33],"acquiring":[35],"and":[36,40,66,74,101,143,164,168,186,229,235,241],"analysing":[37],"data/devices":[39,73],"lack":[42],"forensic":[44,157,177,190,246],"tools.":[45,247],"Besides":[46],"technical":[47,140],"challenges,":[48],"concepts":[52,83],"have":[57],"yet":[58],"to":[59,128,154,160,166,176,200,231,250],"explored":[61],"definitions,":[64],"experience":[65],"capability":[67],"analysis":[70],"current/future":[75],"challenges.":[76],"A":[77],"deeper":[78],"understanding":[79,271],"these":[81],"various":[82],"will":[84,276],"help":[85,277],"progress":[86],"field.":[88],"To":[89],"achieve":[90],"this":[91],"goal,":[92],"we":[93],"conducted":[94],"survey":[96,252],"which":[97,275],"received":[98],"70":[99],"responses":[100,249],"provided":[102,268],"following":[104],"results:":[105],"(1)":[106],"is":[109,117],"sub-domain":[111],"forensics,":[114],"but":[115],"it":[116],"undecided":[118],"what":[119],"domains":[120],"included;":[122],"(2)":[123],"practitioners":[124],"already":[126],"having":[127],"examine":[129],"even":[132],"though":[133],"they":[134],"felt":[135],"undertrained;":[136],"(3)":[137],"requirements":[138],"for":[139],"training,":[141],"software":[142],"education":[144],"non-existent;":[146],"(4)":[147],"high":[148],"priority":[149],"on":[150,195,208,211,217,226,254],"research":[151,196,223,281],"should":[152,179,206,224],"develop":[155],"tools,":[158],"how":[159],"preserve":[161],"volatile":[162],"methods":[165],"identify":[167],"acquire":[169],"from":[171],"cloud;":[173],"(5)":[174],"improvements":[175],"tools":[178],"aimed":[181],"at":[182],"acquisition":[184],"(imaging)":[185],"device":[187],"disassembly":[188],"/":[189],"process;":[191],"(6)":[192],"practitioners'":[193],"perspectives":[194],"direction":[197],"differ":[198],"slightly":[199],"non-practitioners":[201],"focus":[205,216,225],"breaking":[209],"encryption":[210,234],"rather":[214],"than":[215],"cloud":[218,240],"forensics;":[220],"(7)":[221],"future":[222],"developing":[227],"initiatives":[228],"strategies":[230],"overcome":[232],"trail":[236],"obfuscation":[237],"ongoing":[242],"development":[243],"The":[248],"question":[253],"definition":[256],"helped":[260],"us":[261],"formulate":[262],"working":[264],"definition.":[265],"This":[266],"has":[267],"clearer":[270],"subject,":[274],"further":[278],"advance":[279],"area.":[282]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
