{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:17:18Z","timestamp":1725700638609},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["2025682,2230609"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,14]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361416","type":"proceedings-article","created":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T19:38:38Z","timestamp":1703533118000},"page":"0991-0998","source":"Crossref","is-referenced-by-count":0,"title":["Analyzing Edge IoT Digital Forensics Tools: Cyber Attacks Reconstruction and Anti-Forensics Enhancements"],"prefix":"10.1109","author":[{"given":"Elena","family":"Becker","sequence":"first","affiliation":[{"name":"Tennessee Tech University,Department of Computer Science,Cookeville,TN,USA"}]},{"given":"Maanak","family":"Gupta","sequence":"additional","affiliation":[{"name":"Tennessee Tech University,Department of Computer Science,Cookeville,TN,USA"}]},{"given":"Feras M.","family":"Awaysheh","sequence":"additional","affiliation":[{"name":"Institute of Computer Science, University of Tartu,Tartu,Estonia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3165809"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-021-01323-4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.10.001"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-020-01168-6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-10354-1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS49300.2020.9116298"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/sym12010104"},{"journal-title":"A Walkthrough of Digital Forensics and its Tools","year":"2020","author":"Narwal","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.07.006"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-6351-1_15"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/aiccsa.2018.8612868"},{"journal-title":"arXiv preprint","article-title":"Iotdots: A digital forensics framework for smart environments","year":"2018","author":"Babun","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-90775-8_3"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05885-6_17"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2012.26"},{"article-title":"What is Digital Forensics?","volume-title":"EC-Council.org","year":"2023","key":"ref16"},{"article-title":"compare splunk enterprise vs wireshark 2023","volume-title":"Capterra","year":"2023","key":"ref18"},{"volume-title":"Using the volatility framework for analyzing physical memory dumps","year":"2023","author":"Pavel","key":"ref19"},{"volume-title":"Free & open source computer forensics tools","year":"2023","key":"ref20"},{"volume-title":"Caine Forensic environment","year":"2023","author":"Garg","key":"ref21"},{"article-title":"Digital Forensics Review and tutorial project (Caine)","volume-title":"Daniel Taylors Projects Blog","year":"2023","author":"Taylor","key":"ref22"},{"volume-title":"Open Source Network Forensic Analysis Tool (NFAT)\u00a0","year":"2023","author":"Costa","key":"ref23"},{"volume-title":"Networkminer - the NSM and network forensics analysis tool","year":"2023","key":"ref24"},{"article-title":"Volatility Is an Essential DFIR Tool-Heres Why","volume-title":"Booz Allen","year":"2023","author":"Olatona","key":"ref25"},{"article-title":"SIFT Workstation","volume-title":"SANS","year":"2023","author":"Lee","key":"ref26"},{"volume-title":"Elastic Stack: Elasticsearch, Kibana, Beats & Logstash","year":"2023","key":"ref27"},{"article-title":"Microsoft Sentinel - Cloud SIEM Solution: Microsoft Security","volume-title":"Cloud SIEM Solution - Microsoft Security","year":"2023","key":"ref28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/edge60047.2023.00063"},{"volume-title":"Anti Forensics","year":"2023","author":"Singhan","key":"ref30"},{"volume-title":"Countering Anti-Forensic Efforts - Part 2","year":"2023","author":"Afonin","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2020.3045661"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/FMEC57183.2022.10062661"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1201\/9781003194538-3"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3450569.3463559"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TPSISA52974.2021.00008"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3205977.3205994"}],"event":{"name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","start":{"date-parts":[[2023,11,14]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2023,11,17]]}},"container-title":["2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10361260\/10360496\/10361416.pdf?arnumber=10361416","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T20:44:59Z","timestamp":1705092299000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10361416\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,14]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361416","relation":{},"subject":[],"published":{"date-parts":[[2023,11,14]]}}}