{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T04:28:20Z","timestamp":1729139300617,"version":"3.27.0"},"reference-count":29,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100005416","name":"Norges Forskningsr\u00e5d","doi-asserted-by":"publisher","award":["248094\/O70"],"id":[{"id":"10.13039\/501100005416","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Forensic Science International: Digital Investigation"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1016\/j.fsidi.2023.301506","type":"journal-article","created":{"date-parts":[[2023,3,20]],"date-time":"2023-03-20T14:53:55Z","timestamp":1679324035000},"page":"301506","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":2,"special_numbering":"S","title":["Evidence in the fog \u2013 Triage in fog computing systems"],"prefix":"10.1016","volume":"44","author":[{"given":"Jens-Petter","family":"Sandvik","sequence":"first","affiliation":[]},{"given":"Katrin","family":"Franke","sequence":"additional","affiliation":[]},{"given":"Habtamu","family":"Abie","sequence":"additional","affiliation":[]},{"given":"Andr\u00e9","family":"\u00c5rnes","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.fsidi.2023.301506_bib1","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-021-00926-y","article-title":"Enhanced layered fog architecture for IoT sensing and actuation as a service","volume":"11","author":"Alammari","year":"2021","journal-title":"Sci. Rep."},{"year":"2017","series-title":"Digital Forensics","author":"\u00c5rnes","key":"10.1016\/j.fsidi.2023.301506_bib2"},{"key":"10.1016\/j.fsidi.2023.301506_bib3","series-title":"MCC\u201912 - Proceedings of the 1st ACM Mobile Cloud Computing Workshop","first-page":"13","article-title":"Fog computing and its role in the internet of things","author":"Bonomi","year":"2012"},{"year":"2009","series-title":"Handbook of Digital Forensics and Investigation","author":"Casey","key":"10.1016\/j.fsidi.2023.301506_bib4"},{"key":"10.1016\/j.fsidi.2023.301506_bib5","series-title":"14th USENIX Security Symposium","first-page":"331","article-title":"Shredding your garbage: reducing data lifetime through secure deallocation","author":"Chow","year":"2005"},{"key":"10.1016\/j.fsidi.2023.301506_bib6","series-title":"Internet of Things","first-page":"61","article-title":"Chapter 4 - fog computing: principles, architectures, and applications","author":"Dastjerdi","year":"2016"},{"key":"10.1016\/j.fsidi.2023.301506_bib7","article-title":"Osmotic management of distributed complex systems: a declarative decentralised approach","author":"Forti","year":"2021","journal-title":"J.\u00a0Softw.: Evolut. Process"},{"key":"10.1016\/j.fsidi.2023.301506_bib8","series-title":"2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)","first-page":"377","article-title":"On the influence of fog colonies partitioning in fog application Makespan","author":"Guerrero","year":"2018"},{"key":"10.1016\/j.fsidi.2023.301506_bib9","series-title":"Proceedings of the 7th Python in Science Conference. Pasadena, CA USA","doi-asserted-by":"crossref","first-page":"11","DOI":"10.25080\/TCWV9851","article-title":"Exploring network structure, dynamics, and function using NetworkX","author":"Hagberg","year":"2008"},{"key":"10.1016\/j.fsidi.2023.301506_bib10","series-title":"Proceedings of the Tenth International Network Conference","first-page":"163","article-title":"Digital evidence challenges in the internet of things","author":"Hegarty","year":"2014"},{"key":"10.1016\/j.fsidi.2023.301506_bib11","series-title":"Proceedings of the Second ACM SIGCOMM Workshop on Mobile Cloud Computing - MCC \u201913","first-page":"15","article-title":"Mobile fog: a programming model for large\u2013scale applications on the internet of things","author":"Hong","year":"2013"},{"issue":"11","key":"10.1016\/j.fsidi.2023.301506_bib12","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1109\/MCOM.2017.1700322","article-title":"Vehicular fog computing: architecture, use case, and security and forensic challenges","volume":"55","author":"Huang","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.fsidi.2023.301506_bib13","series-title":"2016 24th Telecommunications Forum (TELFOR)","first-page":"1","article-title":"State of the art: fog computing for 5G networks","author":"Kitanov","year":"2016"},{"key":"10.1016\/j.fsidi.2023.301506_bib14","series-title":"2018 Third International Conference on Fog and Mobile Edge Computing (FMEC)","first-page":"115","article-title":"Comparing centrality indices for network usage optimization of data placement policies in fog devices","author":"Lera","year":"2018"},{"issue":"2","key":"10.1016\/j.fsidi.2023.301506_bib15","doi-asserted-by":"crossref","first-page":"3641","DOI":"10.1109\/JIOT.2018.2889511","article-title":"Availability-aware service placement policy in fog computing based on graph partitions","volume":"6","author":"Lera","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.fsidi.2023.301506_bib16","doi-asserted-by":"crossref","first-page":"91745","DOI":"10.1109\/ACCESS.2019.2927895","article-title":"YAFS: a simulator for IoT scenarios in fog computing","volume":"7","author":"Lera","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.fsidi.2023.301506_bib17","doi-asserted-by":"crossref","first-page":"9912","DOI":"10.1109\/ACCESS.2019.2891130","article-title":"Resource allocation and task offloading for heterogeneous real-time tasks with uncertain duration time in a fog queueing system","volume":"7","author":"Li","year":"2019","journal-title":"IEEE Access"},{"issue":"5","key":"10.1016\/j.fsidi.2023.301506_bib18","doi-asserted-by":"crossref","first-page":"5481","DOI":"10.1109\/TVT.2020.2980934","article-title":"A\u00a0distributed mobile fog computing scheme for mobile delay-sensitive applications in SDN-enabled vehicular networks","volume":"69","author":"Lin","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.fsidi.2023.301506_bib19","series-title":"Proceedings of the Digital Forensic Research Conference, DFRWS 2014 EU 11","first-page":"S104","article-title":"Out of sight, but not out of mind: traces of nearby devices' wireless transmissions in volatile memory","author":"Minnaard","year":"2014"},{"key":"10.1016\/j.fsidi.2023.301506_bib20","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1016\/j.future.2020.12.021","article-title":"Dynamic fog-to-fog offloading in SDN-based fog computing systems","volume":"117","author":"Phan","year":"2021","journal-title":"Future Generat. Comput. Syst."},{"key":"10.1016\/j.fsidi.2023.301506_bib21","series-title":"2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","first-page":"1","article-title":"Efficient energy utilization in fog computing based wireless sensor networks","author":"Rafi","year":"2019"},{"issue":"2","key":"10.1016\/j.fsidi.2023.301506_bib22","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1016\/j.icte.2021.05.004","article-title":"A\u00a0review on fog computing: architecture, fog with IoT, algorithms and research challenges","volume":"7","author":"Sabireen","year":"2021","journal-title":"ICT Express"},{"key":"10.1016\/j.fsidi.2023.301506_bib23","article-title":"Quantifying data volatility for IoT forensics with examples from Contiki OS","volume":"40","author":"Sandvik","year":"2022","journal-title":"Forensic Sci. Int.: Digit. Invest."},{"key":"10.1016\/j.fsidi.2023.301506_bib24","series-title":"Digital Forensic Investigation of Internet of Things (IoT) Devices, Advanced Sciences and Technologies for Security Applications. Advanced Sciences and Technologies for Security Applications","first-page":"21","article-title":"Towards a generic approach of quantifying evidence volatility in resource constrained devices","author":"Sandvik","year":"2021"},{"key":"10.1016\/j.fsidi.2023.301506_bib25","series-title":"2016 International Computer Symposium (ICS)","first-page":"731","article-title":"Mobile edge fog computing in 5G era: architecture and implementation","author":"Singh","year":"2016"},{"issue":"1","key":"10.1016\/j.fsidi.2023.301506_bib26","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1080\/02564602.2016.1141077","article-title":"A\u00a0survey on 5G network technologies from social perspective","volume":"34","author":"Singh","year":"2017","journal-title":"IETE Tech. Rev."},{"issue":"4","key":"10.1016\/j.fsidi.2023.301506_bib27","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1007\/s11761-017-0219-8","article-title":"Optimized IoT service placement in the fog","volume":"11","author":"Skarlat","year":"2017","journal-title":"Serv. Orient. Comput. Appl."},{"key":"10.1016\/j.fsidi.2023.301506_bib28","series-title":"2018 IEEE Green Technologies Conference (GreenTech)","first-page":"161","article-title":"Thread: an IoT Protocol","author":"Unwala","year":"2018"},{"key":"10.1016\/j.fsidi.2023.301506_bib29","article-title":"RFC 6550: RPL: IPv6 routing Protocol for low-power and Lossy networks","author":"Winter","year":"2012","journal-title":"Tech. rep., IETF."}],"container-title":["Forensic Science International: Digital Investigation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2666281723000070?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2666281723000070?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T18:12:44Z","timestamp":1729102364000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2666281723000070"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3]]},"references-count":29,"alternative-id":["S2666281723000070"],"URL":"https:\/\/doi.org\/10.1016\/j.fsidi.2023.301506","relation":{},"ISSN":["2666-2817"],"issn-type":[{"type":"print","value":"2666-2817"}],"subject":[],"published":{"date-parts":[[2023,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Evidence in the fog \u2013 Triage in fog computing systems","name":"articletitle","label":"Article Title"},{"value":"Forensic Science International: Digital Investigation","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.fsidi.2023.301506","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"301506"}}