{"id":"https://openalex.org/W2938440064","doi":"https://doi.org/10.4018/jdm.2018100102","title":"Monitor and Detect Suspicious Transactions With Database Forensic Analysis","display_name":"Monitor and Detect Suspicious Transactions With Database Forensic Analysis","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2938440064","doi":"https://doi.org/10.4018/jdm.2018100102","mag":"2938440064"},"language":"en","primary_location":{"id":"doi:10.4018/jdm.2018100102","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jdm.2018100102","pdf_url":null,"source":{"id":"https://openalex.org/S73024538","display_name":"Journal of Database Management","issn_l":"1063-8016","issn":["1063-8016","1533-8010"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Database Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024364212","display_name":"Harmeet Kaur Khanuja","orcid":"https://orcid.org/0000-0002-8240-4257"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Harmeet Kaur Khanuja","raw_affiliation_strings":["MMCOE, SPPU, Maharashtra, India"],"affiliations":[{"raw_affiliation_string":"MMCOE, SPPU, Maharashtra, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064870084","display_name":"Dattatraya Adane","orcid":"https://orcid.org/0000-0003-3182-3328"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dattatraya Adane","raw_affiliation_strings":["Shri Ramdeobaba College of Engineering and Management, Nagpur, India"],"affiliations":[{"raw_affiliation_string":"Shri Ramdeobaba College of Engineering and Management, Nagpur, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5024364212"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.7381,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.7622674,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"29","issue":"4","first_page":"28","last_page":"50"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7543612122535706},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.7357684969902039},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.623195230960846},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.4831632971763611},{"id":"https://openalex.org/keywords/transaction-processing","display_name":"Transaction processing","score":0.4235844612121582},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3400835692882538}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7543612122535706},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.7357684969902039},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.623195230960846},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.4831632971763611},{"id":"https://openalex.org/C72108876","wikidata":"https://www.wikidata.org/wiki/Q844565","display_name":"Transaction processing","level":3,"score":0.4235844612121582},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3400835692882538},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4018/jdm.2018100102","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jdm.2018100102","pdf_url":null,"source":{"id":"https://openalex.org/S73024538","display_name":"Journal of Database Management","issn_l":"1063-8016","issn":["1063-8016","1533-8010"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Database Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7799999713897705,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W121798011","https://openalex.org/W183702945","https://openalex.org/W187419946","https://openalex.org/W1510005398","https://openalex.org/W1600834507","https://openalex.org/W1950177300","https://openalex.org/W1964089535","https://openalex.org/W1971591815","https://openalex.org/W1996767106","https://openalex.org/W2020060785","https://openalex.org/W2026205070","https://openalex.org/W2038762701","https://openalex.org/W2048573274","https://openalex.org/W2090333267","https://openalex.org/W2098678654","https://openalex.org/W2100678256","https://openalex.org/W2107689792","https://openalex.org/W2107715659","https://openalex.org/W2118341639","https://openalex.org/W2119802522","https://openalex.org/W2134274113","https://openalex.org/W2137013318","https://openalex.org/W2140190241","https://openalex.org/W2149329415","https://openalex.org/W2273299442","https://openalex.org/W2494483068","https://openalex.org/W2506361341","https://openalex.org/W2546298453","https://openalex.org/W2750653585","https://openalex.org/W2753708779","https://openalex.org/W2867605356","https://openalex.org/W2902004974","https://openalex.org/W4229793012"],"related_works":["https://openalex.org/W2363110500","https://openalex.org/W2371295991","https://openalex.org/W2385369652","https://openalex.org/W2143226912","https://openalex.org/W2158759608","https://openalex.org/W2403667029","https://openalex.org/W2387697730","https://openalex.org/W2142526524","https://openalex.org/W2349862564","https://openalex.org/W4250256557"],"abstract_inverted_index":{"The":[0,27,46,92,118],"extensive":[1],"usage":[2],"of":[3,59,70,112,121,136,143],"web":[4],"has":[5],"given":[6],"rise":[7],"to":[8,36,49,100,115,140],"financially":[9],"motivated":[10],"illegal":[11,25,39],"covert":[12],"online":[13],"transactions.":[14,26,61,106,145],"So":[15],"the":[16,38,43,63,86,109,113,131,137],"digital":[17],"investigators":[18],"have":[19,30],"approached":[20],"databases":[21],"for":[22,53],"investigating":[23],"undetected":[24],"authors":[28],"here":[29],"designed":[31],"and":[32,55,76,89,133],"developed":[33],"a":[34],"methodology":[35],"find":[37],"financial":[40],"transactions":[41,52,67,114,122,139],"through":[42],"database":[44,51,72],"logs.":[45],"objective":[47],"is":[48,123],"monitor":[50],"detecting":[54],"reporting":[56],"risk":[57,134],"level":[58,135],"suspicious":[60,105],"Initially,":[62],"process":[64],"extracts":[65],"SQL":[66],"from":[68],"logs":[69],"different":[71],"systems,":[73],"then":[74],"transforms":[75],"loads":[77],"them":[78],"separately":[79],"in":[80],"uniform":[81],"XML":[82],"format":[83],"which":[84],"gives":[85,108],"transaction":[87,93],"records":[88,94],"its":[90],"metadata.":[91],"are":[95],"processed":[96],"with":[97],"well-defined":[98],"rules":[99],"get":[101],"outliers":[102],"present":[103],"as":[104],"This":[107,129],"initial":[110],"belief":[111,119],"be":[116],"suspicious.":[117],"value":[120],"further":[124],"rationalised":[125],"using":[126],"Dempster-Shafer's":[127],"theory.":[128],"verifies":[130],"uncertainty":[132],"suspected":[138],"assure":[141],"occurrences":[142],"fraud":[144]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
