{"id":"https://openalex.org/W4388621259","doi":"https://doi.org/10.1145/3607720.3607739","title":"Towards an Open-Source Based E-Mail Forensic Tool that uses Headers in Digital Investigation","display_name":"Towards an Open-Source Based E-Mail Forensic Tool that uses Headers in Digital Investigation","publication_year":2023,"publication_date":"2023-05-24","ids":{"openalex":"https://openalex.org/W4388621259","doi":"https://doi.org/10.1145/3607720.3607739"},"language":"en","primary_location":{"id":"doi:10.1145/3607720.3607739","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3607720.3607739","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 6th International Conference on Networking, Intelligent Systems &amp; Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093251144","display_name":"Remilekun Adeopatoye","orcid":"https://orcid.org/0009-0003-9124-1722"},"institutions":[{"id":"https://openalex.org/I76661892","display_name":"Federal University of Technology Minna","ror":"https://ror.org/0568y3j03","country_code":"NG","type":"education","lineage":["https://openalex.org/I76661892"]}],"countries":["NG"],"is_corresponding":true,"raw_author_name":"Remilekun Adeopatoye","raw_affiliation_strings":["Cyber Security Science, Federal University of Technology, Minna, Nigeria"],"raw_orcid":"https://orcid.org/0009-0003-9124-1722","affiliations":[{"raw_affiliation_string":"Cyber Security Science, Federal University of Technology, Minna, Nigeria","institution_ids":["https://openalex.org/I76661892"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001801878","display_name":"Richard A. Ikuesan","orcid":"https://orcid.org/0000-0001-7355-2314"},"institutions":[{"id":"https://openalex.org/I91044093","display_name":"Zayed University","ror":"https://ror.org/03snqfa66","country_code":"AE","type":"education","lineage":["https://openalex.org/I91044093"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Richard Adeyemi Ikuesan","raw_affiliation_strings":["CAT Department, College of Technological Innovation, Zayed University, United Arab Emirates"],"raw_orcid":"https://orcid.org/0000-0001-7355-2314","affiliations":[{"raw_affiliation_string":"CAT Department, College of Technological Innovation, Zayed University, United Arab Emirates","institution_ids":["https://openalex.org/I91044093"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079057437","display_name":"Taurai Hungwe","orcid":"https://orcid.org/0000-0003-2719-0839"},"institutions":[{"id":"https://openalex.org/I2802393258","display_name":"Sefako Makgatho Health Sciences University","ror":"https://ror.org/003hsr719","country_code":"ZA","type":"education","lineage":["https://openalex.org/I2802393258"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Taurai Hungwe","raw_affiliation_strings":["Department of Computer Science and IT, Sefako Makgatho University of Health Sciences, South Africa"],"raw_orcid":"https://orcid.org/0000-0003-2719-0839","affiliations":[{"raw_affiliation_string":"Department of Computer Science and IT, Sefako Makgatho University of Health Sciences, South Africa","institution_ids":["https://openalex.org/I2802393258"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063662573","display_name":"Victor R. Kebande","orcid":"https://orcid.org/0000-0003-4071-4596"},"institutions":[{"id":"https://openalex.org/I52719799","display_name":"Blekinge Institute of Technology","ror":"https://ror.org/0093a8w51","country_code":"SE","type":"education","lineage":["https://openalex.org/I52719799"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Victor Kebande","raw_affiliation_strings":["Blekinge institute of Technology, Sweden"],"raw_orcid":"https://orcid.org/0000-0003-4071-4596","affiliations":[{"raw_affiliation_string":"Blekinge institute of Technology, Sweden","institution_ids":["https://openalex.org/I52719799"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076587013","display_name":"Mehdi Sookhak","orcid":"https://orcid.org/0000-0001-5822-3432"},"institutions":[{"id":"https://openalex.org/I91045830","display_name":"Texas A&M University","ror":"https://ror.org/01f5ytq51","country_code":"US","type":"education","lineage":["https://openalex.org/I91045830"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mehdi Sookhak","raw_affiliation_strings":["Department of Computer Science, Texas A&amp;M University, USA"],"raw_orcid":"https://orcid.org/0000-0001-5822-3432","affiliations":[{"raw_affiliation_string":"Department of Computer Science, Texas A&amp;M University, USA","institution_ids":["https://openalex.org/I91045830"]}]}],"institutions":[],"countries_distinct_count":5,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5093251144"],"corresponding_institution_ids":["https://openalex.org/I76661892"],"apc_list":null,"apc_paid":null,"fwci":0.8968,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.80969928,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/header","display_name":"Header","score":0.8395559787750244},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7818419933319092},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.7051348686218262},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6062275767326355},{"id":"https://openalex.org/keywords/soundness","display_name":"Soundness","score":0.5667111277580261},{"id":"https://openalex.org/keywords/digital-evidence","display_name":"Digital evidence","score":0.5617891550064087},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5526203513145447},{"id":"https://openalex.org/keywords/network-forensics","display_name":"Network forensics","score":0.499220609664917},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4850125014781952},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4670601785182953},{"id":"https://openalex.org/keywords/open-source","display_name":"Open source","score":0.4450819790363312},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.43790990114212036},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.43436169624328613},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.42292332649230957},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3902629613876343},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.08502298593521118}],"concepts":[{"id":"https://openalex.org/C48105269","wikidata":"https://www.wikidata.org/wiki/Q1141160","display_name":"Header","level":2,"score":0.8395559787750244},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7818419933319092},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.7051348686218262},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6062275767326355},{"id":"https://openalex.org/C39920170","wikidata":"https://www.wikidata.org/wiki/Q693083","display_name":"Soundness","level":2,"score":0.5667111277580261},{"id":"https://openalex.org/C2781357168","wikidata":"https://www.wikidata.org/wiki/Q5276084","display_name":"Digital evidence","level":3,"score":0.5617891550064087},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5526203513145447},{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.499220609664917},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4850125014781952},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4670601785182953},{"id":"https://openalex.org/C3018397939","wikidata":"https://www.wikidata.org/wiki/Q3644502","display_name":"Open source","level":3,"score":0.4450819790363312},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.43790990114212036},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.43436169624328613},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.42292332649230957},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3902629613876343},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.08502298593521118},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3607720.3607739","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3607720.3607739","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 6th International Conference on Networking, Intelligent Systems &amp; Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.800000011920929}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W185406290","https://openalex.org/W1972900646","https://openalex.org/W2095163644","https://openalex.org/W2104987990","https://openalex.org/W2243895554","https://openalex.org/W2552037941","https://openalex.org/W2560124394","https://openalex.org/W2624808154","https://openalex.org/W2777222560","https://openalex.org/W2778296523","https://openalex.org/W2785736788","https://openalex.org/W2801267854","https://openalex.org/W2907659073","https://openalex.org/W3010040184","https://openalex.org/W3035531995","https://openalex.org/W3042273161","https://openalex.org/W3143463065","https://openalex.org/W3210059387","https://openalex.org/W3215802769","https://openalex.org/W6607448945","https://openalex.org/W6729192165"],"related_works":["https://openalex.org/W4238452393","https://openalex.org/W2489557937","https://openalex.org/W4283205458","https://openalex.org/W4240498326","https://openalex.org/W2480188389","https://openalex.org/W3001565613","https://openalex.org/W3018602826","https://openalex.org/W2904082727","https://openalex.org/W2073008201","https://openalex.org/W4391002340"],"abstract_inverted_index":{"Email-related":[0],"incidents/crimes":[1],"are":[2,195],"on":[3,91,148],"the":[4,8,75,99,121,130,163,169,186,192],"rise":[5],"owing":[6],"to":[7,42,58,65,113,157,161,171],"fact":[9],"that":[10,38,46,62,82,97,109,154,173,185],"communication":[11],"by":[12],"electronic":[13],"mail":[14],"(e-mail)":[15],"has":[16],"become":[17],"an":[18,30,93,134,138],"important":[19,31],"part":[20],"of":[21,77,105,133,144,168,191],"our":[22],"daily":[23],"lives.":[24],"The":[25,80,141],"technicality":[26],"behind":[27],"e-mail":[28,118],"plays":[29],"role":[32],"when":[33],"looking":[34],"for":[35],"digital":[36,115],"evidence":[37,116,139,194],"can":[39,47,63],"be":[40,48],"used":[41,49,98],"create":[43],"a":[44,60,70,150],"hypothesis":[45],"during":[50],"litigation.":[51],"During":[52],"this":[53,83,106,145,183],"process,":[54],"it":[55,110],"is":[56,85,88,108,155],"needful":[57],"have":[59,175],"tool":[61,96],"help":[64],"isolate":[66],"email":[67],"incidents":[68],"as":[69],"potential":[71],"crime":[72],"scene":[73],"in":[74,129,179],"wake":[76],"suspected":[78],"attacks.":[79],"problem":[81],"paper":[84,146],"addressing":[86],"paper,":[87],"more":[89],"centered":[90],"realizing":[92],"open-source":[94],"email-forensic":[95],"header":[100,131],"analysis":[101],"approach.":[102],"One":[103],"advantage":[104],"approach":[107],"helps":[111],"investigators":[112],"collect":[114],"from":[117],"systems,":[119],"organize":[120],"collected":[122,193],"data,":[123],"analyze":[124],"and":[125,136,166,188],"discover":[126],"any":[127,180],"discrepancies":[128],"fields":[132],"e-mail,":[135],"generates":[137],"report.":[140],"main":[142],"contribution":[143],"focuses":[147],"generating":[149],"freshly":[151],"computed":[152],"hash":[153],"attached":[156],"every":[158],"generated":[159],"report,":[160],"ensure":[162],"verifiability,":[164],"reliability,":[165],"integrity":[167],"reports":[170],"prove":[172],"they":[174],"not":[176],"been":[177],"modified":[178],"way.":[181],"Finally,":[182],"ensures":[184],"sanctity":[187],"forensic":[189],"soundness":[190],"maintained.":[196]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
