{"id":"https://openalex.org/W3080369178","doi":"https://doi.org/10.1145/3407023.3409213","title":"4P based forensics investigation framework for smart connected toys","display_name":"4P based forensics investigation framework for smart connected toys","publication_year":2020,"publication_date":"2020-08-25","ids":{"openalex":"https://openalex.org/W3080369178","doi":"https://doi.org/10.1145/3407023.3409213","mag":"3080369178"},"language":"en","primary_location":{"id":"doi:10.1145/3407023.3409213","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3407023.3409213","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055632530","display_name":"Benjamin Yankson","orcid":"https://orcid.org/0000-0003-3306-3748"},"institutions":[{"id":"https://openalex.org/I392282","display_name":"University at Albany, State University of New York","ror":"https://ror.org/012zs8222","country_code":"US","type":"education","lineage":["https://openalex.org/I392282"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Benjamin Yankson","raw_affiliation_strings":["University at Albany"],"affiliations":[{"raw_affiliation_string":"University at Albany","institution_ids":["https://openalex.org/I392282"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068447696","display_name":"Farkhund Iqbal","orcid":"https://orcid.org/0000-0001-9081-3598"},"institutions":[{"id":"https://openalex.org/I91044093","display_name":"Zayed University","ror":"https://ror.org/03snqfa66","country_code":"AE","type":"education","lineage":["https://openalex.org/I91044093"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Farkhund Iqbal","raw_affiliation_strings":["Zayed University, Abu Dhabi"],"affiliations":[{"raw_affiliation_string":"Zayed University, Abu Dhabi","institution_ids":["https://openalex.org/I91044093"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065705195","display_name":"Patrick C. K. Hung","orcid":"https://orcid.org/0000-0002-9903-4862"},"institutions":[{"id":"https://openalex.org/I39470171","display_name":"University of Ontario Institute of Technology","ror":"https://ror.org/016zre027","country_code":"CA","type":"education","lineage":["https://openalex.org/I39470171"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Patrick C. K. Hung","raw_affiliation_strings":["OntarioTech University, Oshawa, Ontario"],"affiliations":[{"raw_affiliation_string":"OntarioTech University, Oshawa, Ontario","institution_ids":["https://openalex.org/I39470171"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5055632530"],"corresponding_institution_ids":["https://openalex.org/I392282"],"apc_list":null,"apc_paid":null,"fwci":1.6014,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.87888877,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.8743611574172974},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.8464152812957764},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7308226227760315},{"id":"https://openalex.org/keywords/terabyte","display_name":"Terabyte","score":0.7157770395278931},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.7069334983825684},{"id":"https://openalex.org/keywords/digital-evidence","display_name":"Digital evidence","score":0.7031174302101135},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6246106624603271},{"id":"https://openalex.org/keywords/artifact","display_name":"Artifact (error)","score":0.6078732013702393},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5596418976783752},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.5158335566520691},{"id":"https://openalex.org/keywords/crime-scene","display_name":"Crime scene","score":0.45549261569976807},{"id":"https://openalex.org/keywords/subject","display_name":"Subject (documents)","score":0.4475845694541931},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.44266945123672485},{"id":"https://openalex.org/keywords/plan","display_name":"Plan (archaeology)","score":0.4328177869319916},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.4112912118434906},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.24263161420822144},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.11435207724571228},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.10869091749191284},{"id":"https://openalex.org/keywords/criminology","display_name":"Criminology","score":0.07983803749084473}],"concepts":[{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.8743611574172974},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.8464152812957764},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7308226227760315},{"id":"https://openalex.org/C199683683","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Terabyte","level":2,"score":0.7157770395278931},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.7069334983825684},{"id":"https://openalex.org/C2781357168","wikidata":"https://www.wikidata.org/wiki/Q5276084","display_name":"Digital evidence","level":3,"score":0.7031174302101135},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6246106624603271},{"id":"https://openalex.org/C2779010991","wikidata":"https://www.wikidata.org/wiki/Q2720909","display_name":"Artifact (error)","level":2,"score":0.6078732013702393},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5596418976783752},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.5158335566520691},{"id":"https://openalex.org/C171906077","wikidata":"https://www.wikidata.org/wiki/Q1360677","display_name":"Crime scene","level":2,"score":0.45549261569976807},{"id":"https://openalex.org/C2777855551","wikidata":"https://www.wikidata.org/wiki/Q12310021","display_name":"Subject (documents)","level":2,"score":0.4475845694541931},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.44266945123672485},{"id":"https://openalex.org/C2776505523","wikidata":"https://www.wikidata.org/wiki/Q4785468","display_name":"Plan (archaeology)","level":2,"score":0.4328177869319916},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4112912118434906},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.24263161420822144},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.11435207724571228},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.10869091749191284},{"id":"https://openalex.org/C73484699","wikidata":"https://www.wikidata.org/wiki/Q161733","display_name":"Criminology","level":1,"score":0.07983803749084473},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C157915830","wikidata":"https://www.wikidata.org/wiki/Q2928001","display_name":"Bubble","level":2,"score":0.0},{"id":"https://openalex.org/C129307140","wikidata":"https://www.wikidata.org/wiki/Q6795880","display_name":"Maximum bubble pressure method","level":3,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3407023.3409213","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3407023.3409213","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.49000000953674316}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W2113523995","https://openalex.org/W2155877710","https://openalex.org/W2266573070","https://openalex.org/W2293726002","https://openalex.org/W2419674579","https://openalex.org/W2621190648","https://openalex.org/W2742412825","https://openalex.org/W2997060564","https://openalex.org/W3001891325","https://openalex.org/W3020936273","https://openalex.org/W4230979769","https://openalex.org/W6729355923","https://openalex.org/W6903478944"],"related_works":["https://openalex.org/W2187765491","https://openalex.org/W354740698","https://openalex.org/W1576621636","https://openalex.org/W4320007010","https://openalex.org/W2943306894","https://openalex.org/W2113856930","https://openalex.org/W4254593994","https://openalex.org/W3080369178","https://openalex.org/W2067038993","https://openalex.org/W2972694196"],"abstract_inverted_index":{"Smart":[0],"Connected":[1],"Toys":[2],"(SCTs)":[3],"have":[4],"the":[5,39,42,50,74,81,85,105,150],"potential":[6],"to":[7,60,91,116,159,171],"collect":[8],"terabytes":[9],"of":[10,22,41,62,96,99,110,127,193],"sensitive":[11],"personal,":[12],"contextual,":[13],"and":[14,66,77,84,108,113,132,142,164],"usage":[15],"information":[16,112],"which":[17,37,118,156],"may":[18],"be":[19],"a":[20,27,33,94,97,125,168,180,187,191],"subject":[21,192],"cybercrime":[23,30],"or":[24,47,190],"used":[25],"as":[26,93,167],"conduit":[28],"for":[29,140],"resulting":[31],"in":[32,56,130,179,186],"digital":[34,43,121,137,173],"forensic":[35,122,138,174],"investigation":[36,147,189],"requires":[38],"examination":[40],"artifact":[44],"stored,":[45],"processed":[46],"transmitted":[48],"by":[49],"SCT.":[51],"SCT":[52,82,89,178,183],"forensics":[53,64,146],"is":[54,184],"challenging":[55],"most":[57],"cases":[58],"due":[59],"non-availability":[61],"specialized":[63],"tools":[65],"standardized":[67],"evidence":[68],"acquisition":[69],"interface":[70],"port.":[71],"We":[72],"explore":[73],"various":[75],"privacy":[76],"security":[78],"challenges":[79],"plaguing":[80],"industry":[83],"possible":[86,114],"safety":[87],"risk":[88],"poses":[90],"children":[92],"result":[95,126],"lack":[98],"serious":[100],"consideration":[101],"technical":[102],"controls":[103],"surrounding":[104],"collection,":[106],"processing,":[107],"storage":[109],"children's":[111],"exposure":[115],"crime":[117],"will":[119],"require":[120],"investigation.":[123],"As":[124],"this":[128],"gap":[129],"research":[131],"industry,":[133],"we":[134],"investigate":[135],"current":[136],"solutions":[139],"SCTs":[141],"present":[143],"an":[144,177],"abstract":[145],"framework":[148],"with":[149],"focus":[151],"on":[152,176],"using":[153],"non-conventional":[154],"means":[155,170],"allow":[157],"Investigators":[158],"successfully":[160],"\"Plan,\"":[161],"\"Preserve\"":[162],"\"Process\"":[163],"\"Present\"":[165],"(4P)":[166],"systematic":[169],"conduct":[172],"analysis":[175],"situation":[181],"where":[182],"complicit":[185],"criminal":[188],"crime.":[194]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
