{"id":"https://openalex.org/W2095163644","doi":"https://doi.org/10.4018/jdcf.2013010101","title":"A Review of Current Research in Network Forensic Analysis","display_name":"A Review of Current Research in Network Forensic Analysis","publication_year":2013,"publication_date":"2013-01-01","ids":{"openalex":"https://openalex.org/W2095163644","doi":"https://doi.org/10.4018/jdcf.2013010101","mag":"2095163644"},"language":"en","primary_location":{"id":"doi:10.4018/jdcf.2013010101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jdcf.2013010101","pdf_url":null,"source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},"type":"review","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Ikuesan R. Adeyemi","orcid":null},"institutions":[{"id":"https://openalex.org/I4576418","display_name":"University of Technology Malaysia","ror":"https://ror.org/026w31v75","country_code":"MY","type":"education","lineage":["https://openalex.org/I4576418"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Ikuesan R. Adeyemi","raw_affiliation_strings":["Information Assurance and Security Research Group in the Department of Computer Science, Universiti Teknologi Malaysia, Johor Bahru, Johor, Malaysia"],"affiliations":[{"raw_affiliation_string":"Information Assurance and Security Research Group in the Department of Computer Science, Universiti Teknologi Malaysia, Johor Bahru, Johor, Malaysia","institution_ids":["https://openalex.org/I4576418"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030241377","display_name":"Shukor Abd Razak","orcid":"https://orcid.org/0000-0002-8824-6069"},"institutions":[{"id":"https://openalex.org/I4576418","display_name":"University of Technology Malaysia","ror":"https://ror.org/026w31v75","country_code":"MY","type":"education","lineage":["https://openalex.org/I4576418"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Shukor Abd Razak","raw_affiliation_strings":["Information Assurance and Security Research Group in the Department of Computer Science, Universiti Teknologi Malaysia, Johor Bahru, Johor, Malaysia"],"affiliations":[{"raw_affiliation_string":"Information Assurance and Security Research Group in the Department of Computer Science, Universiti Teknologi Malaysia, Johor Bahru, Johor, Malaysia","institution_ids":["https://openalex.org/I4576418"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027756550","display_name":"Nor Amira Nor Azhan","orcid":null},"institutions":[{"id":"https://openalex.org/I4576418","display_name":"University of Technology Malaysia","ror":"https://ror.org/026w31v75","country_code":"MY","type":"education","lineage":["https://openalex.org/I4576418"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Nor Amira Nor Azhan","raw_affiliation_strings":["Information Assurance and Security Research Group in the Department of Computer Science, Universiti Teknologi Malaysia, Johor Bahru, Johor, Malaysia"],"affiliations":[{"raw_affiliation_string":"Information Assurance and Security Research Group in the Department of Computer Science, Universiti Teknologi Malaysia, Johor Bahru, Johor, Malaysia","institution_ids":["https://openalex.org/I4576418"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I4576418"],"apc_list":null,"apc_paid":null,"fwci":2.5068,"has_fulltext":false,"cited_by_count":39,"citation_normalized_percentile":{"value":0.9167814,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"5","issue":"1","first_page":"1","last_page":"26"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/network-forensics","display_name":"Network forensics","score":0.8284648656845093},{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.7387011051177979},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.728645920753479},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5924186110496521},{"id":"https://openalex.org/keywords/relevance","display_name":"Relevance (law)","score":0.5880329608917236},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4982576370239258},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.48009613156318665},{"id":"https://openalex.org/keywords/criminal-investigation","display_name":"Criminal investigation","score":0.43931955099105835},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3991731107234955},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18532347679138184},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1490877866744995},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.10480719804763794},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.09454384446144104}],"concepts":[{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.8284648656845093},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.7387011051177979},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.728645920753479},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5924186110496521},{"id":"https://openalex.org/C158154518","wikidata":"https://www.wikidata.org/wiki/Q7310970","display_name":"Relevance (law)","level":2,"score":0.5880329608917236},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4982576370239258},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.48009613156318665},{"id":"https://openalex.org/C117660856","wikidata":"https://www.wikidata.org/wiki/Q1964968","display_name":"Criminal investigation","level":2,"score":0.43931955099105835},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3991731107234955},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18532347679138184},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1490877866744995},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.10480719804763794},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.09454384446144104}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/jdcf.2013010101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jdcf.2013010101","pdf_url":null,"source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jdcf00:v:5:y:2013:i:1:p:1-26","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jdcf.2013010101","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.800000011920929,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":57,"referenced_works":["https://openalex.org/W21785587","https://openalex.org/W63326921","https://openalex.org/W149308470","https://openalex.org/W194643239","https://openalex.org/W812237848","https://openalex.org/W1534020534","https://openalex.org/W1549590828","https://openalex.org/W1605131548","https://openalex.org/W1605595327","https://openalex.org/W1654306951","https://openalex.org/W1664109705","https://openalex.org/W1777357078","https://openalex.org/W1966819490","https://openalex.org/W1970399788","https://openalex.org/W1996619035","https://openalex.org/W1999234217","https://openalex.org/W2000674713","https://openalex.org/W2001594339","https://openalex.org/W2007625919","https://openalex.org/W2014130556","https://openalex.org/W2015652442","https://openalex.org/W2016111742","https://openalex.org/W2033505354","https://openalex.org/W2036903135","https://openalex.org/W2047691574","https://openalex.org/W2053819965","https://openalex.org/W2073732532","https://openalex.org/W2092119328","https://openalex.org/W2093056930","https://openalex.org/W2097179283","https://openalex.org/W2101843742","https://openalex.org/W2106671073","https://openalex.org/W2110719115","https://openalex.org/W2112785421","https://openalex.org/W2116123582","https://openalex.org/W2130430857","https://openalex.org/W2130598205","https://openalex.org/W2134444029","https://openalex.org/W2134844567","https://openalex.org/W2137151509","https://openalex.org/W2137245058","https://openalex.org/W2148914579","https://openalex.org/W2153221215","https://openalex.org/W2155815418","https://openalex.org/W2156350103","https://openalex.org/W2159796259","https://openalex.org/W2160727041","https://openalex.org/W2171689381","https://openalex.org/W2189229284","https://openalex.org/W2533218293","https://openalex.org/W2534766289","https://openalex.org/W2942963309","https://openalex.org/W3138273970","https://openalex.org/W4285719527","https://openalex.org/W6653830163","https://openalex.org/W6664116290","https://openalex.org/W6728729632"],"related_works":["https://openalex.org/W2972427363","https://openalex.org/W2121070677","https://openalex.org/W2161391695","https://openalex.org/W4238452393","https://openalex.org/W1500698787","https://openalex.org/W188028618","https://openalex.org/W2489557937","https://openalex.org/W2111038567","https://openalex.org/W1970399788","https://openalex.org/W4385257722"],"abstract_inverted_index":{"Establishing":[0],"facts":[1],"on":[2,114,119,136,142],"cyber":[3,12,17],"crime":[4],"is":[5,23,74,125],"gradually":[6],"gaining":[7],"wider":[8],"relevance":[9],"in":[10,38,47,69,107,145],"prosecuting":[11],"criminals.":[13],"The":[14,61],"branch":[15],"of":[16,36,131],"policing":[18],"saddled":[19],"with":[20],"this":[21],"responsibility":[22],"the":[24,33,44,80,90,104,111,115,128],"network":[25,48,71,83,86,98,108,120,132,146],"forensic":[26,99],"community":[27,130],"(researchers,":[28],"developer,":[29],"and":[30,58,85,140],"investigator).":[31],"However,":[32],"recurring":[34],"rate":[35],"advances":[37],"cybercrime":[39],"poses":[40],"greater":[41],"challenge":[42],"to":[43,56,127],"available":[45],"improvements":[46],"forensics":[49,121],"analysis":[50],"tools":[51],"(NFAT)":[52],"as":[53,55,101,103],"well":[54,102],"investigators,":[57],"ultimately,":[59],"researchers.":[60],"need":[62],"for":[63,134],"an":[64],"efficient":[65],"cutting-edge":[66],"research":[67,105,117,124,129,138,144],"finding":[68],"curbing":[70],"crimes":[72],"therefore":[73],"undeniably":[75],"critical.":[76],"This":[77,123],"paper":[78,112],"describes":[79],"distinction":[81],"between":[82],"security":[84],"forensics.":[87,109,147],"In":[88],"addition,":[89],"authors":[91],"identify":[92],"factors":[93],"that":[94],"militate":[95],"against":[96],"most":[97],"techniques":[100],"challenges":[106],"Furthermore,":[110],"discusses":[113],"current":[116],"works":[118],"analysis.":[122],"useful":[126],"forensics,":[133],"knowledge":[135],"existing":[137],"techniques,":[139],"direction":[141],"further":[143]},"counts_by_year":[{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":6},{"year":2016,"cited_by_count":2},{"year":2014,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
