{"id":"https://openalex.org/W2758188612","doi":"https://doi.org/10.1504/ijesdf.2017.10008013","title":"An investigation into the forensic implications of the Windows 10 operating system: recoverable artefacts and significant changes from Windows 8.1","display_name":"An investigation into the forensic implications of the Windows 10 operating system: recoverable artefacts and significant changes from Windows 8.1","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2758188612","doi":"https://doi.org/10.1504/ijesdf.2017.10008013","mag":"2758188612"},"language":"en","primary_location":{"id":"doi:10.1504/ijesdf.2017.10008013","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijesdf.2017.10008013","pdf_url":null,"source":{"id":"https://openalex.org/S198660693","display_name":"International Journal of Electronic Security and Digital Forensics","issn_l":"1751-911X","issn":["1751-911X","1751-9128"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Electronic Security and Digital Forensics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042597883","display_name":"Diana Hintea","orcid":"https://orcid.org/0000-0002-9061-9493"},"institutions":[{"id":"https://openalex.org/I73417466","display_name":"Coventry University","ror":"https://ror.org/01tgmhj36","country_code":"GB","type":"education","lineage":["https://openalex.org/I73417466"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Diana Hintea","raw_affiliation_strings":["Faculty of Engineering, Environment and Computing, Coventry University Gulson Rd, Coventry, CV1 2JH West Midlands, UK"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, Environment and Computing, Coventry University Gulson Rd, Coventry, CV1 2JH West Midlands, UK","institution_ids":["https://openalex.org/I73417466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055769570","display_name":"Robert Bird","orcid":"https://orcid.org/0000-0002-0848-8843"},"institutions":[{"id":"https://openalex.org/I73417466","display_name":"Coventry University","ror":"https://ror.org/01tgmhj36","country_code":"GB","type":"education","lineage":["https://openalex.org/I73417466"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Robert Bird","raw_affiliation_strings":["Faculty of Engineering, Environment and Computing, Coventry University Gulson Rd, Coventry, CV1 2JH West Midlands, UK"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, Environment and Computing, Coventry University Gulson Rd, Coventry, CV1 2JH West Midlands, UK","institution_ids":["https://openalex.org/I73417466"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100628981","display_name":"Michael Green","orcid":"https://orcid.org/0000-0002-4184-9452"},"institutions":[{"id":"https://openalex.org/I73417466","display_name":"Coventry University","ror":"https://ror.org/01tgmhj36","country_code":"GB","type":"education","lineage":["https://openalex.org/I73417466"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Michael Green","raw_affiliation_strings":["Faculty of Engineering, Environment and Computing, Coventry University Gulson Rd, Coventry, CV1 2JH West Midlands, UK"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, Environment and Computing, Coventry University Gulson Rd, Coventry, CV1 2JH West Midlands, UK","institution_ids":["https://openalex.org/I73417466"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5042597883"],"corresponding_institution_ids":["https://openalex.org/I73417466"],"apc_list":null,"apc_paid":null,"fwci":1.4509,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.8715895,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"9","issue":"4","first_page":"326","last_page":"326"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9754999876022339,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7625435590744019},{"id":"https://openalex.org/keywords/microsoft-windows","display_name":"Microsoft Windows","score":0.4973590672016144},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4805082082748413},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.4528052806854248},{"id":"https://openalex.org/keywords/forensic-science","display_name":"Forensic science","score":0.43004146218299866},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.33959680795669556},{"id":"https://openalex.org/keywords/history","display_name":"History","score":0.10498100519180298},{"id":"https://openalex.org/keywords/archaeology","display_name":"Archaeology","score":0.09655925631523132},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.07623395323753357}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7625435590744019},{"id":"https://openalex.org/C508378895","wikidata":"https://www.wikidata.org/wiki/Q1406","display_name":"Microsoft Windows","level":3,"score":0.4973590672016144},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4805082082748413},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.4528052806854248},{"id":"https://openalex.org/C140505726","wikidata":"https://www.wikidata.org/wiki/Q495304","display_name":"Forensic science","level":2,"score":0.43004146218299866},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.33959680795669556},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.10498100519180298},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.09655925631523132},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.07623395323753357}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1504/ijesdf.2017.10008013","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijesdf.2017.10008013","pdf_url":null,"source":{"id":"https://openalex.org/S198660693","display_name":"International Journal of Electronic Security and Digital Forensics","issn_l":"1751-911X","issn":["1751-911X","1751-9128"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Electronic Security and Digital Forensics","raw_type":"journal-article"},{"id":"pmh:oai:pure.atira.dk:publications/34ddd1ea-402f-4578-894e-cfc771c3ebc0","is_oa":false,"landing_page_url":"https://pureportal.coventry.ac.uk/en/publications/an-investigation-into-the-forensic-implications-of-the-windows-10-operating-system-recoverable-artefacts-and-significant-changes-from-windows-81(34ddd1ea-402f-4578-894e-cfc771c3ebc0).html","pdf_url":null,"source":{"id":"https://openalex.org/S4306402411","display_name":"Pure (Coventry University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I73417466","host_organization_name":"Coventry University","host_organization_lineage":["https://openalex.org/I73417466"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Hintea, D, Bird, R & Green, M 2017, 'An investigation into the forensic implications of the Windows 10 operating system: recoverable artefacts and significant changes from Windows 8.1', International Journal of Electronic Security and Digital Forensics, vol. 9, no. 4, pp. 326-345. https://doi.org/10.1504/IJESDF.2017.10008013","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W116395549","https://openalex.org/W192026353","https://openalex.org/W310602596","https://openalex.org/W561145213","https://openalex.org/W919859439","https://openalex.org/W1534992827","https://openalex.org/W1969240345","https://openalex.org/W1998957169","https://openalex.org/W2022108140","https://openalex.org/W2033360454","https://openalex.org/W2074963777","https://openalex.org/W2078469142","https://openalex.org/W2122122011","https://openalex.org/W2138143450","https://openalex.org/W2211900011","https://openalex.org/W2300707846","https://openalex.org/W2334541668","https://openalex.org/W2341073995","https://openalex.org/W2628759714"],"related_works":["https://openalex.org/W2937484179","https://openalex.org/W2977653791","https://openalex.org/W4256444941","https://openalex.org/W25917909","https://openalex.org/W2504308523","https://openalex.org/W4239548142","https://openalex.org/W618686436","https://openalex.org/W4239882962","https://openalex.org/W2282620829","https://openalex.org/W2774100693"],"abstract_inverted_index":{"With":[0],"the":[1,19,26,80,89,97,115,123,130],"release":[2],"of":[3,28,36,83,96],"Microsoft's":[4],"latest":[5],"operating":[6],"system,":[7],"Windows":[8,23,37,75,85,102,108,134],"10,":[9],"forensic":[10],"investigators":[11],"must":[12],"examine":[13],"it":[14,91],"in":[15,43,74,77,107,114,133],"order":[16,44],"to":[17,45,79,129],"determine":[18],"changes":[20],"implemented":[21],"from":[22],"8.1":[24,103],"and":[25,39,63,121],"addition":[27],"new":[29,41,131],"artefacts.":[30,48],"This":[31],"study":[32],"is":[33],"an":[34],"analysis":[35],"10":[38,76,135],"its":[40],"features":[42,132],"distinguish":[46],"these":[47],"The":[49,66],"tools":[50],"used":[51],"include:":[52],"VMware":[53],"Fusion,":[54],"FTK":[55],"Imager,":[56],"Process":[57,59],"Monitor,":[58],"Explorer,":[60],"ESEDatabase":[61],"View":[62],"Registry":[64],"Explorer.":[65],"paper":[67],"also":[68,122,137],"determines":[69],"if":[70],"artefacts":[71,99,127],"have":[72],"changed":[73],"comparison":[78],"previous":[81],"version":[82],"Windows,":[84],"8.1.":[86],"When":[87],"comparing":[88],"two":[90],"was":[92],"found":[93,100],"that":[94],"many":[95],"pre-existing":[98],"within":[101],"are":[104,112,119,136],"still":[105],"present":[106],"10.":[109],"Slight":[110],"differences":[111],"noted":[113],"way":[116],"prefetch":[117],"files":[118],"compressed":[120],"thumbnail":[124],"databases.":[125],"Significant":[126],"related":[128],"reported.":[138]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
