{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:06:24Z","timestamp":1743048384304,"version":"3.40.3"},"reference-count":27,"publisher":"SAGE Publications","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2016,10,13]]},"DOI":"10.3233\/jifs-169105","type":"journal-article","created":{"date-parts":[[2016,10,14]],"date-time":"2016-10-14T14:30:47Z","timestamp":1476455447000},"page":"2645-2658","source":"Crossref","is-referenced-by-count":2,"title":["Forensic artifacts modeling for social media client applications to enhance investigatory learning mechanisms"],"prefix":"10.1177","volume":"31","author":[{"given":"Haider","family":"Abbas","sequence":"first","affiliation":[{"name":"King Saud University, Riyadh, Saudi Arabia"},{"name":"National University of Sciences and Technology, Islamabad, Pakistan"}]},{"given":"Muhammad","family":"Yasin","sequence":"additional","affiliation":[{"name":"National University of Sciences and Technology, Islamabad, Pakistan"}]},{"given":"Fahad","family":"Ahmed","sequence":"additional","affiliation":[{"name":"National University of Sciences and Technology, Islamabad, Pakistan"}]},{"given":"Anam","family":"Sajid","sequence":"additional","affiliation":[{"name":"Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology (SZABIST), Islamabad, Pakistan"}]},{"given":"Farrukh Aslam","family":"Khan","sequence":"additional","affiliation":[{"name":"King Saud University, Riyadh, Saudi Arabia"}]},{"given":"Rana Aamir Raza","family":"Ashfaq","sequence":"additional","affiliation":[{"name":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, Guangdong, China"}]},{"given":"Nur Al Hasan","family":"Haldar","sequence":"additional","affiliation":[{"name":"King Saud University, Riyadh, Saudi Arabia"}]}],"member":"179","reference":[{"issue":"3","key":"10.3233\/JIFS-169105_ref1","first-page":"4427","article-title":"\u201cWindows registry forensics: An imperative step in tracking data theft via USB devices\u201d","volume":"3","author":"Roy","year":"2012","journal-title":"International Journal of Computer Science and Information Technologies"},{"issue":"1-2","key":"10.3233\/JIFS-169105_ref2","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.diin.2009.02.002","article-title":"\u2019FAUST: Forensic artifacts of uninstalled steganography tools\u2019","volume":"6","author":"Zax","year":"2009","journal-title":"Digital Investigation"},{"issue":"2","key":"10.3233\/JIFS-169105_ref3","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.diin.2006.04.002","article-title":"\u2019An examination into MSN Messenger 7.5 contact identification\u2019","volume":"3","author":"Dickson","year":"2006","journal-title":"Digital Investigation"},{"issue":"4","key":"10.3233\/JIFS-169105_ref4","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/j.diin.2006.10.004","article-title":"\u2019An examination into AOL Instant Messenger 5.5 contact identification\u2019","volume":"3","author":"Dickson","year":"2006","journal-title":"Digital Investigation"},{"issue":"2","key":"10.3233\/JIFS-169105_ref6","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.diin.2007.06.019","article-title":"Dongen, Forensic artefacts left by Windows Live Messenger 8.0","volume":"4","author":"van","year":"2007","journal-title":"Digital Investigation"},{"issue":"6","key":"10.3233\/JIFS-169105_ref7","first-page":"620","article-title":"A review on forensic investigation using windows registry and event log files","volume":"4","author":"Meshram","year":"2015","journal-title":"International Journal of Computer Science and Mobile Computing"},{"key":"10.3233\/JIFS-169105_ref9","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1109\/IMF.2009.11","article-title":"Analysis of Download Accelerator Plus (DAP) for Forensic Artefacts","author":"Yasin","year":"2009","journal-title":"2009 Fifth International Conference on IT Security Incident Management and IT Forensics"},{"issue":"4","key":"10.3233\/JIFS-169105_ref12","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1016\/j.diin.2004.10.003","article-title":"Instant messaging investigations on a live Windows XP system","volume":"1","author":"Carvey","year":"2004","journal-title":"Digital Investigation"},{"issue":"2","key":"10.3233\/JIFS-169105_ref14","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.diin.2006.04.002","article-title":"An examination into MSN Messenger 7.5 contact identification","volume":"3","author":"Dickson","year":"2006","journal-title":"Digital Investigation"},{"issue":"3","key":"10.3233\/JIFS-169105_ref15","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/j.diin.2005.07.003","article-title":"The Windows Registry as a forensic resource","volume":"2","author":"Carvey","year":"2005","journal-title":"Digital Investigation"},{"issue":"3","key":"10.3233\/JIFS-169105_ref16","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1016\/j.diin.2006.08.009","article-title":"An examination into Yahoo Messenger 7.0 contact identification","volume":"3","author":"Dickson","year":"2006","journal-title":"Digital Investigation"},{"issue":"3","key":"10.3233\/JIFS-169105_ref17","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/j.diin.2014.04.003","article-title":"Forensic analysis of WhatsApp Messenger on Android smartphones","volume":"11","author":"Anglano","year":"2014","journal-title":"Digital Investigation"},{"key":"10.3233\/JIFS-169105_ref18","doi-asserted-by":"crossref","first-page":"S24","DOI":"10.1016\/j.diin.2012.05.007","article-title":"Forensic analysis of social networking applications on mobile devices","volume":"9","author":"Al Mutawa","year":"2012","journal-title":"Digital Investigation"},{"key":"10.3233\/JIFS-169105_ref19","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1109\/TAEECE.2013.6557209","article-title":"Windows registry analysis for forensic investigation","author":"Saidi","year":"2013","journal-title":"2013 The International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE)"},{"issue":"3","key":"10.3233\/JIFS-169105_ref20","first-page":"106","article-title":"System monitoring and security using keylogger","volume":"2","author":"Tuli","year":"2013","journal-title":"International Journal of Computer Science and Mobile Computing"},{"issue":"3-4","key":"10.3233\/JIFS-169105_ref21","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.diin.2008.01.002","article-title":"Dongen, Forensic artefacts left by Pidgin Messenger 2.0","volume":"4","author":"van","year":"2007","journal-title":"Digital Investigation"},{"key":"10.3233\/JIFS-169105_ref22","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/978-3-319-20125-2_13","article-title":"Introducing and analysis of the windows 8 event log for forensic purposes","volume":"8915","author":"Talebi","year":"2015","journal-title":"Computational Forensics"},{"issue":"2","key":"10.3233\/JIFS-169105_ref23","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.diin.2012.07.001","article-title":"An integrated conceptual digital forensic framework for cloud computing","volume":"9","author":"Martini","year":"2012","journal-title":"Digital Investigation"},{"key":"10.3233\/JIFS-169105_ref24","unstructured":"Chandrakumar F. , Thesis: An evidence-based Android cache forensics model, 1st ed. Adelaide, South Australia: University of South Australia, 2014, pp. 1\u201378."},{"key":"10.3233\/JIFS-169105_ref25","first-page":"935","article-title":"Remote Programmatic vCloud Forensics: A Six-Step Collection Process and a Proof of Concept","author":"Martini","year":"2014","journal-title":"2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications"},{"issue":"6","key":"10.3233\/JIFS-169105_ref26","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1002\/sec.1027","article-title":"Identifying an OpenID anti-phishing scheme for cyberspace","volume":"9","author":"Abbas","year":"2016","journal-title":"Security and Communication Networks"},{"issue":"1","key":"10.3233\/JIFS-169105_ref27","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1108\/09685221111115836","article-title":"Addressing dynamic issues in information security management","volume":"19","author":"Abbas","year":"2011","journal-title":"Info Mngmnt & Comp Security"},{"key":"10.3233\/JIFS-169105_ref28","unstructured":"Pawar P. and Kulkarni P. , Security for windows registry using carving, International Journal of Scientific and Research Publications 3(4) (2013)."},{"issue":"2","key":"10.3233\/JIFS-169105_ref29","doi-asserted-by":"crossref","first-page":"901","DOI":"10.1007\/s11277-015-2961-6","article-title":"Collaborative multi-hop routing in cognitive wireless networks","volume":"86","author":"Jiang","year":"2016","journal-title":"Wireless Personal Communications"},{"issue":"5","key":"10.3233\/JIFS-169105_ref30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-016-0475-8","article-title":"Bigdata oriented multimedia mobile health applications","volume":"40","author":"Lv","year":"2016","journal-title":"Journal of Medical Systems"},{"key":"10.3233\/JIFS-169105_ref31","first-page":"1","article-title":"Multimedia cloud transmission and storage system based on internet of things","author":"Yang","year":"2016","journal-title":"Multimedia Tools and Applications"},{"key":"10.3233\/JIFS-169105_ref32","first-page":"1","article-title":"A multicast delivery approach with minimum energy consumption for wireless multi-hop networks","author":"Jiang","year":"2016","journal-title":"Telecommunication Systems"}],"container-title":["Journal of Intelligent & Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-169105","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:06:42Z","timestamp":1742969202000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-169105"}},"subtitle":[],"editor":[{"given":"Zhihan","family":"Lv","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2016,10,13]]},"references-count":27,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.3233\/jifs-169105","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"type":"print","value":"1064-1246"},{"type":"electronic","value":"1875-8967"}],"subject":[],"published":{"date-parts":[[2016,10,13]]}}}