{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T18:34:25Z","timestamp":1732041265977},"reference-count":270,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100002809","name":"Generalitat de Catalunya","doi-asserted-by":"publisher","award":["2020 BP 00035"],"id":[{"id":"10.13039\/501100002809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["830929","832735"],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3154059","type":"journal-article","created":{"date-parts":[[2022,2,24]],"date-time":"2022-02-24T20:26:31Z","timestamp":1645734391000},"page":"25464-25493","source":"Crossref","is-referenced-by-count":64,"title":["Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-4296-2876","authenticated-orcid":false,"given":"Fran","family":"Casino","sequence":"first","affiliation":[{"name":"Department of Computer Engineering and Mathematics, Universitat Rovira i Virgili, Tarragona, Spain"}]},{"given":"Thomas K.","family":"Dasaklis","sequence":"additional","affiliation":[{"name":"Hellenic Open University, Patras, Greece"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2947-486X","authenticated-orcid":false,"given":"Georgios P.","family":"Spathoulas","sequence":"additional","affiliation":[{"name":"Norwegian University of Science and Technology (NTNU), Gjøvik, Norway"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9193-8517","authenticated-orcid":false,"given":"Marios","family":"Anagnostopoulos","sequence":"additional","affiliation":[{"name":"Aalborg University, Copenhagen, Denmark"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9250-9215","authenticated-orcid":false,"given":"Amrita","family":"Ghosal","sequence":"additional","affiliation":[{"name":"CONFIRM Centre, University of Limerick, Limerick, Ireland"}]},{"given":"Istvan","family":"Borocz","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Brussel, Brussels, Belgium"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4881-6215","authenticated-orcid":false,"given":"Agusti","family":"Solanas","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering and Mathematics, Universitat Rovira i Virgili, Tarragona, Spain"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3612-1934","authenticated-orcid":false,"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[{"name":"Department of Mathematics, University of Padua, Padua, Italy"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4460-9331","authenticated-orcid":false,"given":"Constantinos","family":"Patsakis","sequence":"additional","affiliation":[{"name":"Athena Research Center, Information Management Systems Institute, Marousi, Greece"}]}],"member":"263","reference":[{"key":"ref1","first-page":"13","article-title":"The general assumptions and rationale of forensic identification","volume":"2","author":"Thornton","year":"1997","journal-title":"Modern scientific evidence: Law Sci. expert testimony"},{"key":"ref2","volume-title":"Manuel de Technique Polici\u00e8re: Les Constats, les Empreintes Digitales","author":"Locard","year":"1934"},{"issue":"4","key":"ref3","first-page":"249","article-title":"The art of cross-examination","volume":"10","author":"Wellman","year":"1924","journal-title":"Amer. Bar Assoc. J."},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15506-2_1"},{"key":"ref5","volume-title":"Global Guidelines for Digital Forensics Laboratories","year":"2019"},{"key":"ref6","volume-title":"ENISA Threat Landscape 2021","year":"2021"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-021-09575-w"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-021-00117-2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.151"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1177\/002029401004300804"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SADFE.2005.23"},{"issue":"4","key":"ref12","first-page":"39","article-title":"Review of evidence collection and protection phases in digital forensics process","volume":"6","author":"Varol","year":"2017","journal-title":"Int. J. Inf. Secur. Sci."},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.01.002"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/20961790.2020.1837429"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102237"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1093\/gigascience\/giz053"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1186\/s13643-018-0695-8"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1186\/s13643-017-0582-8"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1097\/XEB.0000000000000055"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1186\/s13643-019-1252-9"},{"key":"ref21","first-page":"671","article-title":"Producing a systematic review","volume-title":"The Sage Handbook of Organizational Research Methods","author":"Denyer","year":"2009"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/publications9010012"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.03709"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.02.006"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2019.0100880"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2015.03.002"},{"key":"ref27","first-page":"27","article-title":"A road map for digital forensic research","volume-title":"Proc. 1st Digit. Forensic Res. Workshop","author":"Palmer"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2013.02.004"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/su10041203"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1688"},{"issue":"4","key":"ref31","first-page":"76","article-title":"Cloud forensics issues and opportunities","volume":"4","author":"Aminnezhad","year":"2013","journal-title":"Int. J. Inf. Process. Manage."},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.11.006"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3361216"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8006"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-019-0133-z"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2010.02.003"},{"key":"ref37","volume-title":"Cybersecurity Report 2020","year":"2020"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3004727"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.08.001"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.03.005"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2854724"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-018-0078-7"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2010.01.002"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2019.200892"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.4018\/jdcf.2013010101"},{"issue":"2","key":"ref46","first-page":"244","article-title":"Attack intention recognition: A review","volume":"19","author":"Ahmed","year":"2017","journal-title":"IJ Netw. Secur."},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-010-0216-7"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3177847"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.19026\/rjaset.8.981"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2013.10.003"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.4018\/IJDCF.2015010101"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2940713"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2962586"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11350-9"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100220"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2021.301210"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.03.002"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102494"},{"issue":"1","key":"ref59","first-page":"915","article-title":"A review of digital forensic challenges in the Internet of Things (IoT)","volume":"9","author":"Yakubu","year":"2018","journal-title":"Int. J. Mech. Eng. Technol."},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2916717"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2020.07.009"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.02.005"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/2906149"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/3295453.3295454"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3199673"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.01.001"},{"key":"ref67","article-title":"Memory forensics: Review of acquisition and analysis techniques","author":"Osbourne","year":"2013"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2016.12.004"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3000747"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2014.12.002"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.04.001"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.23919\/SAIEE.2018.8531952"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.3390\/sym9040049"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.3390\/infrastructures6020013"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/1368506.1368516"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-31163-7_1"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2014.09.002"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2019.0100610"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/1306802"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2018.11.006"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCI.2017.8117693"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-69460-9_2"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecPODS.2018.8560672"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1108\/JFC-12-2016-0078"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/3391195"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3033665"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-020-9284-9"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2019.200891"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2975999"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2901858"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.931079"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106727"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.25046\/aj050347"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.12.022"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.3390\/sym12111811"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07102-x"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.2174\/1872212113666190722143334"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2016.08.002"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-021-10046-8"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2015.08.008"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1177\/1062860610376579"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2016.0322"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2907316"},{"issue":"1","key":"ref104","first-page":"6","article-title":"A survey on passive image copy-move forgery detection","volume":"14","author":"Zhang","year":"2018","journal-title":"J. Inf. Process. Syst."},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2013.04.007"},{"issue":"17","key":"ref106","first-page":"5841","article-title":"A review of digital forensics methods for JPEG file carving","volume":"96","author":"Ali","year":"2018","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2812999"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2017.08.009"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31960-5_1"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7217-0"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.04.005"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110807"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging6030009"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09929-9"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2017.11.002"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.04.005"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-10628-2"},{"issue":"1","key":"ref118","first-page":"206","article-title":"Osint by crowdsourcing: A theoretical model for online child abuse investigations","volume":"12","author":"A\u00e7ar","year":"2018","journal-title":"Int. J. Cyber Criminol."},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102092"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2018.095122"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2016\/v9i44\/105142"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09974-4"},{"issue":"1","key":"ref123","first-page":"98","article-title":"Survey: Video forensic tools","volume":"47","author":"Shahraki","year":"2013","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1504\/IJAIP.2020.106040"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-019-09689-5"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-07944-z"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-017-0538-9"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-4277-2"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2016.04.006"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2018.6587"},{"key":"ref131","article-title":"Catch me if you can!\u2014Detecting sandbox evasion techniques","volume-title":"Proc. USENIX Assoc.","author":"Guibernau"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33630-5_22"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1145\/3150376.3150378"},{"key":"ref134","first-page":"1","article-title":"Scientific but not academical overview of malware anti-debugging, anti-disassembly and anti-VM technologies","volume":"1","author":"Branco","year":"2012","journal-title":"Black Hat"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.06.005"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23141-4_9"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10131519"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2015.11.002"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60425-7_4"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1145\/1113034.1113070"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.07.002"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2022.100135"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05885-6_2"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.4108\/eai.13-7-2018.162690"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.02.022"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.3390\/s21206886"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.3390\/smartcities3030046"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2009.06.016"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2017.06.004"},{"key":"ref150","first-page":"1","article-title":"Framework for a digital forensic investigation","volume-title":"Proc. ISSA","author":"K\u00f6hn"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-5064-7_35"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.05.001"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2013.09.007"},{"issue":"1","key":"ref154","first-page":"118","article-title":"Systematic digital forensic investigation model","volume":"5","author":"Agarwal","year":"2011","journal-title":"Int. J. Comput. Sci. Secur."},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.15394\/jdfsl.2013.1154"},{"key":"ref156","article-title":"ACPO good practice guide for digital evidence","author":"Williams","year":"2012"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-86"},{"key":"ref158","volume-title":"Computer Forensics: Incident Response Essentials","author":"Kruse","year":"2001"},{"issue":"3","key":"ref159","first-page":"1","article-title":"An examination of digital forensic models","volume":"1","author":"Reith","year":"2002","journal-title":"Int. J. Digit. Evidence"},{"key":"ref160","article-title":"Getting physical with the investigative process","author":"Carrier","year":"2003","journal-title":"Int. J. Digit. Evidence"},{"key":"ref161","article-title":"The enhanced digital investigation process model","author":"Baryamureeba","year":"2004","journal-title":"Digit. Invest."},{"issue":"1","key":"ref162","first-page":"1","article-title":"An extended model of cybercrime investigations","volume":"3","author":"Ciardhu\u00e1in","year":"2004","journal-title":"International Journal of Digital Evidence"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2011.021226"},{"key":"ref164","volume-title":"Forensic Guidelines","year":"2020"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.5121\/ijcsit.2011.3302"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39891-9_20"},{"key":"ref167","article-title":"B-CoC: A blockchain-based chain of custody for evidences management in digital forensics","volume-title":"arXiv:1807.10359","author":"Bonomi","year":"2018"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.04.011"},{"key":"ref169","volume-title":"Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes","author":"Greenfield","year":"2002"},{"key":"ref170","first-page":"1","article-title":"Cloud computing: Forensic challenges for law enforcement","volume-title":"Proc. Int. Conf. Internet Technol. Secured Trans.","author":"Reilly"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2010.05.009"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-03371-2_17"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/SADFE.2005.24"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102282"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3014615"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.4018\/IJDCF.2018040106"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46578-3_66"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2015.01.015"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2016.077444"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.4018\/IJISP.2017040103"},{"key":"ref181","volume-title":"Information Technology\u2014Security Techniques\u2014Guidelines for Identification, Collection, Acquisition and Preservation of Digital Evidence","year":"2012"},{"key":"ref182","volume-title":"Techniques for Assurance of Digital Material Used in Legal Proceedings\u2014ETSI TS 103 643 v1.1.1 (2020-01)","year":"2020"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-86"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-101r1"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2018.04.009"},{"key":"ref186","volume-title":"Digital Forensics Workbook: Hands-on Activities in Digital Forensics","author":"Robinson","year":"2015"},{"key":"ref187","first-page":"1","volume-title":"Forensic Readiness","author":"Tan","year":"2001"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.09.008"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.04.003"},{"issue":"1","key":"ref190","first-page":"1","article-title":"Forensic readiness: Emerging discipline for creating reliable and secure digital evidence","volume":"22","author":"Endicott-Popovsky","year":"2015","journal-title":"J. Harbin Inst. Technol."},{"issue":"3","key":"ref191","first-page":"173","article-title":"Digital forensic readiness: Are we there yet?","volume":"9","author":"Mouhtaropoulos","year":"2014","journal-title":"J. Int. Commercial Law Technol."},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.09.004"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.10.007"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.04.001"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.01.012"},{"issue":"2","key":"ref196","first-page":"346","article-title":"Digital forensics: Review of issues in scientific validation of digital evidence","volume":"14","author":"Arshad","year":"2018","journal-title":"J. Inf. Process. Syst."},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1057\/sj.2013.29"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1016\/j.scijus.2019.12.005"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1177\/0261927X16663589"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2013.12.031"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2013.04.026"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1075\/aralss.6.02hal"},{"key":"ref203","volume-title":"Introduction to Systemic Functional Linguistics","author":"Eggins","year":"2004"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1037\/h0057532"},{"key":"ref205","volume-title":"The Art Readable Writing","volume":"8","author":"Flesch","year":"1949"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.21236\/ADA006655"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1093\/her\/cyg123"},{"issue":"8","key":"ref208","first-page":"638","article-title":"A new measure for assessing document complexity: The pmose\/ikirsch document readability formula","volume":"41","author":"Mosenthal","year":"1998","journal-title":"J. Adolescent Adult Literacy"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1053\/j.ajkd.2008.01.008"},{"key":"ref210","article-title":"Assessing text difficulty and accessibility","volume-title":"Scaffolding Reading Experiences: Designs for Student Success","author":"Graves","year":"2003"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44270-9_14"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2013.058645"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2011.06.001"},{"key":"ref214","volume-title":"The Neutral Corner: Understanding a Digital Forensics Report","author":"Garrie","year":"2016"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19513-6_7"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsir.2019.100008"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.5235\/175214611799248904"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1162\/152651601300168834"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.cpt.9300301"},{"key":"ref220","volume-title":"Details of treaty no. 185","year":"2004"},{"key":"ref221","volume-title":"Details of Treaty no. 030","year":"1962"},{"key":"ref222","volume-title":"Data Protection and Cybercrime Division, Electronic Evidence Guide","year":"2013"},{"key":"ref223","volume-title":"Towards a Protocol to the Budapest Convention","year":"2018"},{"key":"ref224","volume-title":"Directive (EU) 2016\/680 of the European Parliament and of the Council","year":"2016"},{"key":"ref225","volume-title":"Regulation (EU) no 910\/2014, of the European Parliament and of the Council","year":"2014"},{"key":"ref226","volume-title":"E-evidence\u2014Cross-Border Access to Electronic Evidence","year":"2019"},{"key":"ref227","volume-title":"Regulation (EU) 2016\/95 of the European Parliament and of the Council","year":"2016"},{"key":"ref228","volume-title":"Final Report Summary\u2014European Informatics Data Exchange Framework for Courts and Evidence","year":"2017"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1080\/15567280701418049"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-74872-6"},{"key":"ref231","volume-title":"Electronic Evidence\u2014A basic Guide for First Responders","year":"2015"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1145\/1982185.1982226"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2013.6641055"},{"issue":"1","key":"ref234","first-page":"80","article-title":"Logging system for cloud computing forensic environments","volume":"16","author":"Patrascu","year":"2014","journal-title":"J. Control Eng. Appl. Informat."},{"key":"ref235","first-page":"373","article-title":"A functional architecture for cloud forensic readiness large-scale potential digital evidence analysis","volume-title":"Proc. Eur. Conf. Cyber Warfare Secur.","author":"Kebande"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2482484"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2018.2833502"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-020-02373-5"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2962017"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-70501-5_3"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-017-0379-8"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-019-00443-0"},{"key":"ref243","volume-title":"Trickbot Bazarloader in-Depth","year":"2020"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.08.023"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70290-2_18"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.02.016"},{"key":"ref247","volume-title":"LOCARD: Lawful Evidence Collecting and Continuity Platform Development","year":"2019"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1007\/s42521-021-00035-5"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5316"},{"key":"ref252","doi-asserted-by":"publisher","DOI":"10.3390\/bdcc2040035"},{"key":"ref253","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2016.09.011"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49301-4_17"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.14220\/9783737007627.131"},{"key":"ref256","first-page":"29","article-title":"The second amendment and the struggle over cryptography","volume":"9","author":"Rice","year":"2017","journal-title":"Hastings Sci. Tech. LJ"},{"key":"ref257","first-page":"1","article-title":"Cloaking malware with the trusted platform module","volume-title":"Proc. 20th USENIX Secur. Symp. (USENIX Security)","author":"Dunn"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2870052"},{"key":"ref259","volume-title":"Guideline on Security Measures Under the EECC","year":"2020"},{"key":"ref260","volume-title":"5G \u2014To the Guideline on Security Measures Under the EECC","year":"2020"},{"key":"ref261","volume-title":"SP 800-124 rev. 2\u2014Guidelines for Managing the Security of Mobile Devices in the Enterprise","year":"2020"},{"key":"ref262","volume-title":"NIST Releases Draft Guidance on Internet of Things Device Cybersecurity","year":"2020"},{"key":"ref263","volume-title":"Guidelines for securing the Internet of Things","year":"2020"},{"key":"ref264","volume-title":"Guidelines for SMES on the Security of Personal Data Processing","year":"2017"},{"key":"ref265","doi-asserted-by":"publisher","DOI":"10.6028\/nist.cswp.01162020"},{"key":"ref266","volume-title":"Recommendations on Shaping technology According to GDPR Provisions\u2014Exploring the Notion of Data Protection by Default","year":"2019"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2980235"},{"key":"ref268","volume-title":"Towards a Framework for Policy Development in Cybersecurity\u2014Security and Privacy Considerations in Autonomous Agents","year":"2019"},{"key":"ref269","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101946"},{"key":"ref270","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2020.301074"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09720948.pdf?arnumber=9720948","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T23:07:23Z","timestamp":1705532843000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9720948\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":270,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3154059","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}