{"id":"https://openalex.org/W4377200873","doi":"https://doi.org/10.34028/iajit/20/3a/7","title":"Navigating the Complex Landscape of IoT Forensics: Challenges and Emerging Solutions","display_name":"Navigating the Complex Landscape of IoT Forensics: Challenges and Emerging Solutions","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4377200873","doi":"https://doi.org/10.34028/iajit/20/3a/7"},"language":"en","primary_location":{"id":"doi:10.34028/iajit/20/3a/7","is_oa":true,"landing_page_url":"https://doi.org/10.34028/iajit/20/3a/7","pdf_url":"https://doi.org/10.34028/iajit/20/3a/7","source":{"id":"https://openalex.org/S100666833","display_name":"The International Arab Journal of Information Technology","issn_l":"1683-3198","issn":["1683-3198","2309-4524"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4362726017","host_organization_name":"Zarqa University","host_organization_lineage":["https://openalex.org/P4362726017"],"host_organization_lineage_names":["Zarqa University"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The International Arab Journal of Information Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.34028/iajit/20/3a/7","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007908139","display_name":"Nura Shifa Musa","orcid":"https://orcid.org/0000-0001-7343-4000"},"institutions":[{"id":"https://openalex.org/I161913731","display_name":"Al Ain University","ror":"https://ror.org/023abrt21","country_code":"AE","type":"education","lineage":["https://openalex.org/I161913731"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Nura Musa","raw_affiliation_strings":["College of Engineering, Al Ain University, UAE"],"affiliations":[{"raw_affiliation_string":"College of Engineering, Al Ain University, UAE","institution_ids":["https://openalex.org/I161913731"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044007513","display_name":"Nada Masood Mirza","orcid":"https://orcid.org/0000-0002-4410-7657"},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Nada Mirza","raw_affiliation_strings":["College of Engineering, United Arab Emirates University, UAE"],"affiliations":[{"raw_affiliation_string":"College of Engineering, United Arab Emirates University, UAE","institution_ids":["https://openalex.org/I201726411"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069326900","display_name":"Adnan Ali","orcid":"https://orcid.org/0000-0001-8776-0982"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Adnan Ali","raw_affiliation_strings":["Ain, UAE"],"affiliations":[{"raw_affiliation_string":"Ain, UAE","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5007908139"],"corresponding_institution_ids":["https://openalex.org/I161913731"],"apc_list":null,"apc_paid":null,"fwci":0.9163,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.77940324,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"20","issue":"3A","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8159291744232178},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.6464824080467224},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6413203477859497},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.592427134513855},{"id":"https://openalex.org/keywords/network-forensics","display_name":"Network forensics","score":0.5875634551048279},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5403388738632202},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.533760130405426},{"id":"https://openalex.org/keywords/digital-evidence","display_name":"Digital evidence","score":0.4344596564769745},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.4329809844493866},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.42890673875808716},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.4178636074066162}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8159291744232178},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.6464824080467224},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6413203477859497},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.592427134513855},{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.5875634551048279},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5403388738632202},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.533760130405426},{"id":"https://openalex.org/C2781357168","wikidata":"https://www.wikidata.org/wiki/Q5276084","display_name":"Digital evidence","level":3,"score":0.4344596564769745},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.4329809844493866},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.42890673875808716},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.4178636074066162},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.34028/iajit/20/3a/7","is_oa":true,"landing_page_url":"https://doi.org/10.34028/iajit/20/3a/7","pdf_url":"https://doi.org/10.34028/iajit/20/3a/7","source":{"id":"https://openalex.org/S100666833","display_name":"The International Arab Journal of Information Technology","issn_l":"1683-3198","issn":["1683-3198","2309-4524"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4362726017","host_organization_name":"Zarqa University","host_organization_lineage":["https://openalex.org/P4362726017"],"host_organization_lineage_names":["Zarqa University"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The International Arab Journal of Information Technology","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.34028/iajit/20/3a/7","is_oa":true,"landing_page_url":"https://doi.org/10.34028/iajit/20/3a/7","pdf_url":"https://doi.org/10.34028/iajit/20/3a/7","source":{"id":"https://openalex.org/S100666833","display_name":"The International Arab Journal of Information Technology","issn_l":"1683-3198","issn":["1683-3198","2309-4524"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4362726017","host_organization_name":"Zarqa University","host_organization_lineage":["https://openalex.org/P4362726017"],"host_organization_lineage_names":["Zarqa University"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The International Arab Journal of Information Technology","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6000000238418579}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4377200873.pdf"},"referenced_works_count":42,"referenced_works":["https://openalex.org/W655562666","https://openalex.org/W1446195290","https://openalex.org/W1494351124","https://openalex.org/W1555036802","https://openalex.org/W1994506898","https://openalex.org/W2030681840","https://openalex.org/W2136135923","https://openalex.org/W2525228524","https://openalex.org/W2557496103","https://openalex.org/W2611755027","https://openalex.org/W2612046408","https://openalex.org/W2744140269","https://openalex.org/W2754999301","https://openalex.org/W2899470007","https://openalex.org/W2904972287","https://openalex.org/W2939162399","https://openalex.org/W2942466912","https://openalex.org/W2961998842","https://openalex.org/W2963166063","https://openalex.org/W2969982735","https://openalex.org/W2983771279","https://openalex.org/W2995988651","https://openalex.org/W2999472659","https://openalex.org/W3042919765","https://openalex.org/W3088679843","https://openalex.org/W3127435689","https://openalex.org/W3129689612","https://openalex.org/W3136123736","https://openalex.org/W3167474085","https://openalex.org/W3186377741","https://openalex.org/W3205890643","https://openalex.org/W3213772546","https://openalex.org/W4200100773","https://openalex.org/W4252238651","https://openalex.org/W4256243668","https://openalex.org/W4290987688","https://openalex.org/W4291897550","https://openalex.org/W4310930460","https://openalex.org/W4317608716","https://openalex.org/W4319297709","https://openalex.org/W4323276120","https://openalex.org/W4323318577"],"related_works":["https://openalex.org/W4205455055","https://openalex.org/W3024263644","https://openalex.org/W2744140269","https://openalex.org/W3005239032","https://openalex.org/W4319777530","https://openalex.org/W4323318577","https://openalex.org/W3127435689","https://openalex.org/W2060155568","https://openalex.org/W2174009075","https://openalex.org/W2765343310"],"abstract_inverted_index":{"With":[0],"the":[1,5,26,32,35,40,56,63,73,112,130,136,151,156,160,169,189],"increasing":[2],"proliferation":[3],"of":[4,7,23,28,34,44,59,150,173],"Internet":[6],"Things":[8],"(IoT)":[9],"devices,":[10,25],"digital":[11,75],"forensics":[12,76,154],"professionals":[13],"face":[14],"numerous":[15],"challenges":[16,65],"whilst":[17],"investigating":[18],"cybercrimes.":[19],"The":[20],"vast":[21],"number":[22],"IoT":[24,60,88,125,133,153],"heterogeneity":[27],"their":[29],"formats,":[30],"and":[31,42,66,78,97,100,103,106,117,120,158,171,177,186],"diversity":[33],"data":[36],"they":[37],"generate":[38],"make":[39],"identification":[41],"collection":[43],"relevant":[45],"evidence":[46,84],"a":[47,147,181],"daunting":[48],"task.":[49],"In":[50],"this":[51,144],"research":[52],"paper,":[53],"we":[54,110,128],"explore":[55],"complex":[57],"landscape":[58],"forensics,":[61,134],"highlighting":[62],"major":[64,118],"emerging":[67],"solutions.":[68],"We":[69,80],"start":[70],"by":[71],"listing":[72],"available":[74],"models":[77],"frameworks.":[79],"then":[81],"delve":[82],"into":[83],"management":[85],"during":[86],"different":[87],"forensic":[89],"investigation":[90],"stages":[91],"such":[92],"as":[93,180],"Identification,":[94],"Acquisition,":[95],"Preservation":[96],"Protection,":[98],"Analysis":[99],"Correlation,":[101],"Attack":[102],"Deficit":[104],"Attribution":[105],"lastly":[107],"Presentation.":[108],"Furthermore,":[109],"highlight":[111],"current":[113,152],"challenges,":[114,157],"open":[115],"issues":[116],"security":[119,170],"privacy":[121],"concerns":[122],"related":[123],"to":[124],"forensics.":[126],"Finally,":[127],"review":[129],"state-of-the-art":[131],"in":[132,140,188],"exploring":[135],"possible":[137,162],"solutions":[138],"proposed":[139],"recent":[141],"literature.":[142],"Overall,":[143],"paper":[145],"provides":[146],"comprehensive":[148],"overview":[149],"ecosystem,":[155],"proposes":[159],"latest":[161],"solutions,":[163],"which":[164],"is":[165],"critical":[166,175],"for":[167,184],"ensuring":[168],"integrity":[172],"IoT-enabled":[174],"infrastructures":[176],"can":[178],"serves":[179],"valuable":[182],"resource":[183],"researchers":[185],"practitioners":[187],"field":[190]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-12-24T23:09:58.560324","created_date":"2025-10-10T00:00:00"}
