{"id":"https://openalex.org/W2953519450","doi":"https://doi.org/10.1145/3341325.3341993","title":"IoT Database Forensics","display_name":"IoT Database Forensics","publication_year":2019,"publication_date":"2019-07-01","ids":{"openalex":"https://openalex.org/W2953519450","doi":"https://doi.org/10.1145/3341325.3341993","mag":"2953519450"},"language":"en","primary_location":{"id":"doi:10.1145/3341325.3341993","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3341325.3341993","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://usir.salford.ac.uk/id/eprint/51751/1/HarperDB_ICFNDS%20%282%29.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066224882","display_name":"Robert M. Marsh","orcid":null},"institutions":[{"id":"https://openalex.org/I54459138","display_name":"University of Salford","ror":"https://ror.org/01tmqtf75","country_code":"GB","type":"education","lineage":["https://openalex.org/I54459138"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Robert Marsh","raw_affiliation_strings":["School of Computing, Science and Engineering, University of Salford, Manchester, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing, Science and Engineering, University of Salford, Manchester, UK","institution_ids":["https://openalex.org/I54459138"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044341219","display_name":"Sana Belguith","orcid":"https://orcid.org/0000-0003-0069-8552"},"institutions":[{"id":"https://openalex.org/I54459138","display_name":"University of Salford","ror":"https://ror.org/01tmqtf75","country_code":"GB","type":"education","lineage":["https://openalex.org/I54459138"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Sana Belguith","raw_affiliation_strings":["School of Computing, Science and Engineering, University of Salford, Manchester, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing, Science and Engineering, University of Salford, Manchester, UK","institution_ids":["https://openalex.org/I54459138"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041825756","display_name":"Tooska Dargahi","orcid":"https://orcid.org/0000-0002-0908-6483"},"institutions":[{"id":"https://openalex.org/I54459138","display_name":"University of Salford","ror":"https://ror.org/01tmqtf75","country_code":"GB","type":"education","lineage":["https://openalex.org/I54459138"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Tooska Dargahi","raw_affiliation_strings":["School of Computing, Science and Engineering, University of Salford, Manchester, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing, Science and Engineering, University of Salford, Manchester, UK","institution_ids":["https://openalex.org/I54459138"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5066224882"],"corresponding_institution_ids":["https://openalex.org/I54459138"],"apc_list":null,"apc_paid":null,"fwci":0.7037,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.78067028,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7290320992469788},{"id":"https://openalex.org/keywords/workaround","display_name":"Workaround","score":0.6392959356307983},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.5460696816444397},{"id":"https://openalex.org/keywords/relational-database","display_name":"Relational database","score":0.5033573508262634},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5001859664916992},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.44463682174682617},{"id":"https://openalex.org/keywords/database-server","display_name":"Database server","score":0.4428146183490753},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.43326663970947266},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.41824251413345337},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3494700789451599}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7290320992469788},{"id":"https://openalex.org/C194541083","wikidata":"https://www.wikidata.org/wiki/Q457174","display_name":"Workaround","level":2,"score":0.6392959356307983},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.5460696816444397},{"id":"https://openalex.org/C5655090","wikidata":"https://www.wikidata.org/wiki/Q192588","display_name":"Relational database","level":2,"score":0.5033573508262634},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5001859664916992},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.44463682174682617},{"id":"https://openalex.org/C205295232","wikidata":"https://www.wikidata.org/wiki/Q76320","display_name":"Database server","level":2,"score":0.4428146183490753},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.43326663970947266},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.41824251413345337},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3494700789451599},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/3341325.3341993","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3341325.3341993","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","raw_type":"proceedings-article"},{"id":"pmh:oai:usir.salford.ac.uk:51751","is_oa":true,"landing_page_url":null,"pdf_url":"http://usir.salford.ac.uk/id/eprint/51751/1/HarperDB_ICFNDS%20%282%29.pdf","source":{"id":"https://openalex.org/S4306401501","display_name":"University of Salford Institutional Repository (University of Salford)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I54459138","host_organization_name":"University of Salford","host_organization_lineage":["https://openalex.org/I54459138"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"},{"id":"pmh:oai:research-information.bris.ac.uk:openaire_cris_publications/19c8b87b-82d3-4b34-927d-b3aae1377525","is_oa":false,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/19c8b87b-82d3-4b34-927d-b3aae1377525","pdf_url":null,"source":{"id":"https://openalex.org/S7407055359","display_name":"Explore Bristol Research","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Marsh, R, Belguith, S & Dargahi, T 2019, IoT database forensics: An investigation on HarperDB security. in ACM International Conference Proceeding Series. https://doi.org/10.1145/3341325.3341993","raw_type":"contributionToPeriodical"}],"best_oa_location":{"id":"pmh:oai:usir.salford.ac.uk:51751","is_oa":true,"landing_page_url":null,"pdf_url":"http://usir.salford.ac.uk/id/eprint/51751/1/HarperDB_ICFNDS%20%282%29.pdf","source":{"id":"https://openalex.org/S4306401501","display_name":"University of Salford Institutional Repository (University of Salford)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I54459138","host_organization_name":"University of Salford","host_organization_lineage":["https://openalex.org/I54459138"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.44999998807907104}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2953519450.pdf","grobid_xml":"https://content.openalex.org/works/W2953519450.grobid-xml"},"referenced_works_count":14,"referenced_works":["https://openalex.org/W1986474462","https://openalex.org/W2046006386","https://openalex.org/W2086075943","https://openalex.org/W2762521872","https://openalex.org/W2784252324","https://openalex.org/W2810091000","https://openalex.org/W2886843383","https://openalex.org/W2890527151","https://openalex.org/W2892289067","https://openalex.org/W2897145247","https://openalex.org/W2945443366","https://openalex.org/W2949216696","https://openalex.org/W2997243806","https://openalex.org/W4242527837"],"related_works":["https://openalex.org/W4381612620","https://openalex.org/W2950380533","https://openalex.org/W2998499456","https://openalex.org/W2893207040","https://openalex.org/W3127868735","https://openalex.org/W1840516357","https://openalex.org/W2753986652","https://openalex.org/W1513339978","https://openalex.org/W2025894054","https://openalex.org/W2410380434"],"abstract_inverted_index":{"The":[0,84,121],"data":[1,31,98],"that":[2,41,92,105],"are":[3],"generated":[4],"by":[5],"several":[6,167],"devices":[7],"in":[8,55,132,214],"the":[9,23,56,62,90,136,140,191,208,211,225],"IoT":[10,57],"realm":[11],"require":[12],"careful":[13],"and":[14,44,53,97,112,123,165,227],"real":[15],"time":[16],"processing.":[17],"Recently,":[18],"researchers":[19],"have":[20],"concentrated":[21],"on":[22,89,163,199],"usage":[24],"of":[25,60,78,100,125,127,169,175,180,183,203,210,222],"cloud":[26],"databases":[27],"for":[28,224],"storing":[29],"such":[30,172],"to":[32,47,81,110,116,139,148,187,195,207],"improve":[33],"efficiency.":[34],"HarperDB":[35,63,164],"aims":[36],"at":[37],"producing":[38],"a":[39,73,76,95,103,119,197,220],"DBMS":[40,129],"is":[42,106,130],"relational":[43],"non-relational":[45],"simultaneously,":[46],"help":[48],"journeymen":[49],"developers":[50],"creating":[51,102],"products":[52],"servers":[54],"space.":[58],"Much":[59],"what":[61],"team":[64,85],"has":[65,68,86,113],"talked":[66],"about":[67],"been":[69],"achieved,":[70],"but":[71],"from":[72,94],"security":[74],"perspective,":[75],"lot":[77],"improvements":[79],"need":[80],"be":[82,196],"made.":[83],"clearly":[87],"focused":[88],"problems":[91],"exist":[93],"database":[96],"point":[99],"view,":[101],"structure":[104],"unique,":[107],"fast,":[108],"easy":[109],"use":[111,126],"great":[114],"potential":[115],"grow":[117],"with":[118],"startup.":[120],"functionality":[122],"ease":[124],"this":[128,143,151],"not":[131],"question,":[133],"however":[134],"as":[135,173],"trade-off":[137],"triangle":[138],"right":[141],"suggests,":[142],"does":[144],"entail":[145],"an":[146,159],"impact":[147],"security.":[149],"In":[150],"paper,":[152],"using":[153,190],"multiple":[154],"forensic":[155,161],"methodologies,":[156],"we":[157,218],"performed":[158],"in-depth":[160],"analysis":[162],"found":[166,213],"areas":[168],"extreme":[170],"concern,":[171],"lack":[174],"logging":[176],"functionalities,":[177],"basic":[178],"level":[179],"authorisation,":[181],"exposure":[182],"users'":[184],"access":[185],"rights":[186],"any":[188],"party":[189],"database,":[192],"There":[193],"had":[194],"focus":[198],"preventative":[200],"advice":[201],"instead":[202],"reactive":[204],"workarounds":[205],"due":[206],"nature":[209],"flaws":[212],"HarperDB.":[215],"As":[216],"such,":[217],"provide":[219],"number":[221],"recommendations":[223],"users":[226],"developers.":[228]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2019-07-12T00:00:00"}
