{"id":"https://openalex.org/W6887878872","doi":"https://doi.org/10.18420/inf2022_10","title":"Collecting Identifying Data for Re-Identification of Mobile Devices carried at a Crime Scene using Wi-Fi Routers","display_name":"Collecting Identifying Data for Re-Identification of Mobile Devices carried at a Crime Scene using Wi-Fi Routers","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W6887878872","doi":"https://doi.org/10.18420/inf2022_10"},"language":"en","primary_location":{"id":"doi:10.18420/inf2022_10","is_oa":true,"landing_page_url":"https://doi.org/10.18420/inf2022_10","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.18420/inf2022_10","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Vogel, Daniel","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Vogel, Daniel","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Kr\u00e4mer, Markus","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kr\u00e4mer, Markus","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.1326,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.57526068,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.6360999941825867,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.6360999941825867,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.1103999987244606,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11980","display_name":"Human Mobility and Location-Based Analysis","score":0.04839999973773956,"subfield":{"id":"https://openalex.org/subfields/3313","display_name":"Transportation"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.8357999920845032},{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.7626000046730042},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.7501999735832214},{"id":"https://openalex.org/keywords/mac-address","display_name":"MAC address","score":0.597599983215332},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.5062000155448914},{"id":"https://openalex.org/keywords/data-collection","display_name":"Data collection","score":0.45969998836517334},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4514000117778778},{"id":"https://openalex.org/keywords/unique-identifier","display_name":"Unique identifier","score":0.42170000076293945}],"concepts":[{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.8357999920845032},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.7626000046730042},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.7501999735832214},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6057000160217285},{"id":"https://openalex.org/C2777321455","wikidata":"https://www.wikidata.org/wiki/Q20484","display_name":"MAC address","level":2,"score":0.597599983215332},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5863000154495239},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.5062000155448914},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.45969998836517334},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4514000117778778},{"id":"https://openalex.org/C119839945","wikidata":"https://www.wikidata.org/wiki/Q6545185","display_name":"Unique identifier","level":3,"score":0.42170000076293945},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.412200003862381},{"id":"https://openalex.org/C171906077","wikidata":"https://www.wikidata.org/wiki/Q1360677","display_name":"Crime scene","level":2,"score":0.38100001215934753},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.38040000200271606},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3686999976634979},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3587000072002411},{"id":"https://openalex.org/C95491727","wikidata":"https://www.wikidata.org/wiki/Q992968","display_name":"Mobile telephony","level":3,"score":0.35569998621940613},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.2816999852657318},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.27709999680519104},{"id":"https://openalex.org/C78834623","wikidata":"https://www.wikidata.org/wiki/Q640394","display_name":"Mobile broadband","level":3,"score":0.27559998631477356},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.2572999894618988},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2567000091075897},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2565999925136566}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18420/inf2022_10","is_oa":true,"landing_page_url":"https://doi.org/10.18420/inf2022_10","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.18420/inf2022_10","is_oa":true,"landing_page_url":"https://doi.org/10.18420/inf2022_10","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.8168924450874329,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Mobile":[0],"devices":[1,36,74,119],"such":[2],"as":[3],"smartphones":[4],"constantly":[5],"probe":[6],"the":[7,103],"surrounding":[8],"wireless":[9,99],"medium":[10],"for":[11,54,63,68,93],"providing":[12],"services":[13],"to":[14,26,37,81,107],"users,":[15],"thus":[16,127],"leaving":[17],"traces":[18],"that,":[19],"when":[20],"analysed,":[21],"can":[22,42],"link":[23],"their":[24],"presence":[25],"a":[27,60,85,109,123],"crime.":[28],"Those":[29],"passive":[30],"observations,":[31],"combined":[32],"with":[33,39,84,96,114],"actively":[34],"tricking":[35],"cooperate":[38],"foreign":[40],"networks,":[41],"yield":[43],"an":[44],"attractive":[45],"device":[46],"profile.":[47],"Though":[48],"past":[49],"research":[50],"explores":[51],"independent":[52],"methods":[53],"collecting":[55],"single":[56],"identifiers":[57,83],"of":[58],"devices,":[59],"holistic":[61],"approach":[62,105],"data":[64,95],"seizure":[65],"and":[66,126],"utilization":[67],"law":[69,112],"enforcement":[70,113],"is":[71],"missing.":[72],"As":[73],"carried":[75],"by":[76],"criminals":[77],"are":[78],"not":[79],"willing":[80],"share":[82],"victim's":[86],"home":[87],"network,":[88],"we":[89],"combine":[90],"collection":[91],"processes":[92],"device-identifying":[94],"exploiting":[97],"viable":[98],"communication":[100],"protocols.":[101],"Using":[102],"presented":[104],"allows":[106],"build":[108],"system":[110],"supporting":[111],"evidence":[115],"that":[116],"certain":[117],"mobile":[118],"were":[120],"present":[121],"at":[122],"crime":[124],"scene":[125],"may":[128],"give":[129],"clues":[130],"on":[131,134],"further":[132],"investigations":[133],"suspects.":[135]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
