{"id":"https://openalex.org/W2897121912","doi":"https://doi.org/10.4018/ijkbo.2019010104","title":"An Economical Methodology to Rhetorical Identifications in Cloud Victimization Virtual Machine Snapshots","display_name":"An Economical Methodology to Rhetorical Identifications in Cloud Victimization Virtual Machine Snapshots","publication_year":2018,"publication_date":"2018-10-18","ids":{"openalex":"https://openalex.org/W2897121912","doi":"https://doi.org/10.4018/ijkbo.2019010104","mag":"2897121912"},"language":"en","primary_location":{"id":"doi:10.4018/ijkbo.2019010104","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijkbo.2019010104","pdf_url":null,"source":{"id":"https://openalex.org/S4210171617","display_name":"International Journal of Knowledge-Based Organizations","issn_l":"2155-6393","issn":["2155-6393","2155-6407"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Knowledge-Based Organizations","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033693695","display_name":"Neeraj Bhargava","orcid":"https://orcid.org/0000-0002-1824-499X"},"institutions":[{"id":"https://openalex.org/I56287899","display_name":"Maharshi Dayanand Saraswati University","ror":"https://ror.org/0229k3q35","country_code":"IN","type":"education","lineage":["https://openalex.org/I56287899"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Neeraj Bhargava","raw_affiliation_strings":["School of Engineering and System Sciences, Department of Computer Science, MDS University, Ajmer, India"],"affiliations":[{"raw_affiliation_string":"School of Engineering and System Sciences, Department of Computer Science, MDS University, Ajmer, India","institution_ids":["https://openalex.org/I56287899"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050729478","display_name":"Srinivas Kumar Palvadi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Srinivas Kumar Palvadi","raw_affiliation_strings":["SatyaSai University of Technology and Medical Sciences, Sehore, India"],"affiliations":[{"raw_affiliation_string":"SatyaSai University of Technology and Medical Sciences, Sehore, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060540284","display_name":"Abhishek Kumar","orcid":"https://orcid.org/0000-0003-4161-508X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Abhishek Kumar","raw_affiliation_strings":["Aryabhatta College of Engineering and Research Center, Ajmer, India"],"affiliations":[{"raw_affiliation_string":"Aryabhatta College of Engineering and Research Center, Ajmer, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014450529","display_name":"Pramod Singh Rathore","orcid":"https://orcid.org/0000-0002-4917-1500"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Pramod Singh Rathore","raw_affiliation_strings":["Aryabhatta College of Engineering and Research Center, Ajmer, India"],"affiliations":[{"raw_affiliation_string":"Aryabhatta College of Engineering and Research Center, Ajmer, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5033693695"],"corresponding_institution_ids":["https://openalex.org/I56287899"],"apc_list":null,"apc_paid":null,"fwci":0.3927,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.71838379,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":"9","issue":"1","first_page":"36","last_page":"49"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7523713111877441},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6993787288665771},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6785048246383667},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.4752207398414612},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.4739760756492615},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.46927085518836975},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.12011006474494934}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7523713111877441},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6993787288665771},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6785048246383667},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.4752207398414612},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.4739760756492615},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.46927085518836975},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.12011006474494934},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/ijkbo.2019010104","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijkbo.2019010104","pdf_url":null,"source":{"id":"https://openalex.org/S4210171617","display_name":"International Journal of Knowledge-Based Organizations","issn_l":"2155-6393","issn":["2155-6393","2155-6407"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Knowledge-Based Organizations","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jkbo00:v:9:y:2019:i:1:p:36-49","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJKBO.2019010104","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7599999904632568,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W68904331","https://openalex.org/W78987640","https://openalex.org/W112145782","https://openalex.org/W807351355","https://openalex.org/W1489073918","https://openalex.org/W1552127367","https://openalex.org/W1561135059","https://openalex.org/W1607334332","https://openalex.org/W1641762327","https://openalex.org/W1986294857","https://openalex.org/W2006172326","https://openalex.org/W2025877920","https://openalex.org/W2101889913","https://openalex.org/W2126220112","https://openalex.org/W2148528837","https://openalex.org/W2239741143","https://openalex.org/W2303474472","https://openalex.org/W2312809432","https://openalex.org/W2324571613","https://openalex.org/W2405613152","https://openalex.org/W2473902185","https://openalex.org/W2519051819","https://openalex.org/W2536733332","https://openalex.org/W4240607984","https://openalex.org/W4245247914","https://openalex.org/W4245889338"],"related_works":["https://openalex.org/W2931996793","https://openalex.org/W2028121791","https://openalex.org/W4205234238","https://openalex.org/W2788934790","https://openalex.org/W3167767780","https://openalex.org/W3148880067","https://openalex.org/W4205923274","https://openalex.org/W3043682580","https://openalex.org/W2941559775","https://openalex.org/W3142266060"],"abstract_inverted_index":{"Distributed":[0,174],"computing":[1,66,106,139,235,262],"is":[2,7,147],"a":[3,148],"rising":[4],"innovation":[5],"that":[6,73,247],"in":[8,118,143,164,179,204,230,232,267,272,276],"effect":[9],"generally":[10],"embraced":[11],"all":[12,52],"through":[13],"the":[14,98,111,128,134,137,141,144,153,162,165,171,177,180,185,188,193,196,201,210,216,219,223,228,233,244,250,253,260,264,273,277,282,286,294,302,306,311,315,325],"world":[15],"because":[16],"of":[17,21,70,87,123,136,187,195,222,252,290,308,310],"its":[18],"usability.":[19],"Associations":[20],"various":[22],"types":[23],"can":[24,48],"utilize":[25],"it":[26,94],"without":[27,156,208],"pre-requirements,":[28],"for":[29],"example,":[30],"IT":[31,88],"infra-structure,":[32],"specialized":[33],"abilities,":[34],"administrative":[35],"over-burden,":[36],"stockpiling":[37],"limit,":[38],"preparing":[39],"force,":[40],"and":[41,59,84,91,126,140,161,199,236,263,293,305,314],"information":[42,155,202],"recuperation":[43],"or":[44,176],"protection":[45],"setup.":[46],"It":[47],"be":[49,75,168],"profited":[50],"by":[51,170],"customers":[53],"according":[54],"to":[55,100,104,151],"their":[56,268],"requirements,":[57],"desires":[58],"spending":[60],"plan.":[61],"In":[62,108,296],"any":[63,158],"case,":[64],"distributed":[65,105,119,181,237,265,278,312],"present's":[67],"new":[68],"sorts":[69],"security":[71,159,211,231,303],"vulnerabilities":[72],"should":[74],"promotion":[76],"dressed.":[77],"Customary":[78],"\u201cPC":[79],"forensics\u201d":[80],"manages":[81],"location,":[82],"acquisition":[83],"counteractive":[85],"action":[86],"activated":[89],"fakes":[90],"violations,":[92],"however,":[93],"does":[95],"not":[96],"have":[97],"capacity":[99],"manage":[101],"cybercrimes":[102],"relating":[103],"condition.":[107],"this":[109,297],"article,":[110],"authors":[112],"concentrate":[113],"on":[114,227,243,258,285,301,324],"legal":[115],"sciences":[116],"issues":[117],"computing,":[120],"survey":[121],"restrictions":[122],"criminological":[124],"group":[125],"present":[127],"hindrances":[129],"looked":[130],"amid":[131],"evaluation.":[132],"As":[133],"basis":[135],"cloud":[138,145,261,316],"implementation":[142,304],"environment":[146,182,266,279],"great":[149],"task":[150],"protect":[152],"user":[154],"causing":[157],"issue":[160],"consistency":[163],"data":[166,197,291,317,326],"must":[167],"provided":[169],"service":[172],"provider.":[173],"systems":[175],"operations":[178],"will":[183,248,280,321],"increase":[184,249],"usability":[186],"resources":[189],"as":[190,192],"well":[191],"capability":[194],"transmission":[198],"provide":[200],"required":[203],"an":[205],"effective":[206],"manner":[207],"interrupting":[209],"issues.":[212],"But":[213],"even":[214],"though":[215],"clients":[217],"from":[218],"different":[220],"parts":[221],"globe":[224],"are":[225,241,256],"focusing":[226,242],"gaps":[229],"Cloud":[234],"environment.":[238],"Here":[239],"we":[240,299],"business":[245],"model":[246],"revenue":[251],"firms":[254],"which":[255],"concentrating":[257],"implementing":[259],"respective":[269],"areas.":[270],"Forensics":[271],"customer":[274],"management":[275],"give":[281],"complete":[283],"picture":[284],"digital":[287],"marketing,":[288],"standards":[289],"distribution":[292],"security.":[295,327],"article":[298],"focus":[300,323],"raise":[307],"utilization":[309],"environments":[313],"storage":[318],"capabilities.":[319],"This":[320],"more":[322]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
