{"id":"https://openalex.org/W4229583619","doi":"https://doi.org/10.23919/icact.2018.8323882","title":"WhatsApp network forensics: Discovering the communication payloads behind cybercriminals","display_name":"WhatsApp network forensics: Discovering the communication payloads behind cybercriminals","publication_year":2018,"publication_date":"2018-02-01","ids":{"openalex":"https://openalex.org/W4229583619","doi":"https://doi.org/10.23919/icact.2018.8323882"},"language":"en","primary_location":{"id":"doi:10.23919/icact.2018.8323882","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact.2018.8323882","pdf_url":null,"source":{"id":"https://openalex.org/S4363608106","display_name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061987526","display_name":"Fu-Ching Tsai","orcid":null},"institutions":[{"id":"https://openalex.org/I143545923","display_name":"Central Police University","ror":"https://ror.org/03xms6995","country_code":"TW","type":"education","lineage":["https://openalex.org/I143545923"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Fu-Ching Tsai","raw_affiliation_strings":["Department of Information Management, Central Police University, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Information Management, Central Police University, Taiwan","institution_ids":["https://openalex.org/I143545923"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044004688","display_name":"En-Cih Chang","orcid":null},"institutions":[{"id":"https://openalex.org/I143545923","display_name":"Central Police University","ror":"https://ror.org/03xms6995","country_code":"TW","type":"education","lineage":["https://openalex.org/I143545923"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"En-Cih Chang","raw_affiliation_strings":["Department of Information Management, Central Police University, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Information Management, Central Police University, Taiwan","institution_ids":["https://openalex.org/I143545923"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038738213","display_name":"Da\u2010Yu Kao","orcid":null},"institutions":[{"id":"https://openalex.org/I143545923","display_name":"Central Police University","ror":"https://ror.org/03xms6995","country_code":"TW","type":"education","lineage":["https://openalex.org/I143545923"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Da-Yu Kao","raw_affiliation_strings":["Department of Information Management, Central Police University, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Information Management, Central Police University, Taiwan","institution_ids":["https://openalex.org/I143545923"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5061987526"],"corresponding_institution_ids":["https://openalex.org/I143545923"],"apc_list":null,"apc_paid":null,"fwci":0.9404,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.76351648,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"679","last_page":"684"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7751659750938416},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.6462016105651855},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.625149130821228},{"id":"https://openalex.org/keywords/criminal-investigation","display_name":"Criminal investigation","score":0.5616623759269714},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5552896857261658},{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.550815224647522},{"id":"https://openalex.org/keywords/network-forensics","display_name":"Network forensics","score":0.5270835757255554},{"id":"https://openalex.org/keywords/table","display_name":"Table (database)","score":0.502638578414917},{"id":"https://openalex.org/keywords/sniffing","display_name":"Sniffing","score":0.47271865606307983},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3831791281700134},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.225918710231781},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.19436869025230408},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.16759616136550903},{"id":"https://openalex.org/keywords/criminology","display_name":"Criminology","score":0.07664051651954651}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7751659750938416},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.6462016105651855},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.625149130821228},{"id":"https://openalex.org/C117660856","wikidata":"https://www.wikidata.org/wiki/Q1964968","display_name":"Criminal investigation","level":2,"score":0.5616623759269714},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5552896857261658},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.550815224647522},{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.5270835757255554},{"id":"https://openalex.org/C45235069","wikidata":"https://www.wikidata.org/wiki/Q278425","display_name":"Table (database)","level":2,"score":0.502638578414917},{"id":"https://openalex.org/C131722271","wikidata":"https://www.wikidata.org/wiki/Q7547759","display_name":"Sniffing","level":2,"score":0.47271865606307983},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3831791281700134},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.225918710231781},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.19436869025230408},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.16759616136550903},{"id":"https://openalex.org/C73484699","wikidata":"https://www.wikidata.org/wiki/Q161733","display_name":"Criminology","level":1,"score":0.07664051651954651},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/icact.2018.8323882","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact.2018.8323882","pdf_url":null,"source":{"id":"https://openalex.org/S4363608106","display_name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.6800000071525574,"display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1569133926","https://openalex.org/W2417711523","https://openalex.org/W2492776233","https://openalex.org/W2557842949","https://openalex.org/W2600171532","https://openalex.org/W4234416465","https://openalex.org/W4236740106","https://openalex.org/W4300826984"],"related_works":["https://openalex.org/W3025546445","https://openalex.org/W3031409616","https://openalex.org/W3164984769","https://openalex.org/W1983112135","https://openalex.org/W2049886938","https://openalex.org/W4200166010","https://openalex.org/W3012403896","https://openalex.org/W2022551391","https://openalex.org/W3123529365","https://openalex.org/W2574925464"],"abstract_inverted_index":{"The":[0,51,66,138],"ubiquity":[1],"of":[2,40,53,69,104,154],"instant":[3],"messaging":[4],"(IM)":[5],"apps":[6,76],"on":[7,86],"smart":[8],"phones":[9],"have":[10],"provided":[11],"criminals":[12],"to":[13,20,57,79,97,109,124,133,165,171],"communicate":[14],"with":[15],"channels":[16],"which":[17],"are":[18,25],"difficult":[19],"decode.":[21],"Investigators":[22],"and":[23,63,135,168],"analysts":[24],"increasingly":[26],"experiencing":[27],"large":[28],"data":[29],"sets":[30],"when":[31],"conducting":[32],"cybercrime":[33],"investigations.":[34],"Call":[35],"record":[36,157],"analysis":[37,131],"is":[38,56,77,122],"one":[39],"the":[41,81,87,152],"critical":[42],"criminal":[43,145],"investigation":[44],"strategies":[45],"for":[46,163],"law":[47],"enforcement":[48],"agencies":[49],"(LEAs).":[50],"aim":[52],"this":[54],"paper":[55,91],"investigate":[58],"cybercriminals":[59,167],"through":[60],"network":[61,105],"forensics":[62],"sniffing":[64,120],"techniques.":[65],"main":[67],"difficulty":[68],"retrieving":[70],"valuable":[71],"information":[72],"from":[73,101,128],"specific":[74],"IM":[75],"how":[78],"recognize":[80],"criminal'":[82],"IP":[83],"address":[84],"records":[85],"Interne":[88],"t.":[89],"This":[90],"proposes":[92],"a":[93],"packet":[94],"filter":[95],"framework":[96],"WhatsApp":[98],"communication":[99,146],"patterns":[100],"huge":[102],"collections":[103],"packets":[106,121],"in":[107,119,143],"order":[108],"locate":[110],"criminal's":[111],"identity":[112],"more":[113],"effectively.":[114],"A":[115],"rule":[116],"extraction":[117],"method":[118],"proposed":[123],"retrieve":[125],"relevant":[126],"attributes":[127],"high":[129],"dimensional":[130],"regarding":[132],"geolocation":[134],"pivot":[136],"table.":[137],"results":[139],"can":[140],"support":[141],"LEAs":[142,164],"discovering":[144],"payloads,":[147],"as":[148,150],"well":[149],"facilitating":[151],"effectiveness":[153],"modern":[155],"call":[156],"analysis.":[158],"It":[159],"will":[160],"be":[161],"helpful":[162],"prosecute":[166],"bring":[169],"them":[170],"justice.":[172]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
