{"id":"https://openalex.org/W2172272385","doi":"https://doi.org/10.1109/hicss.2007.617","title":"Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process","display_name":"Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process","publication_year":2007,"publication_date":"2007-01-01","ids":{"openalex":"https://openalex.org/W2172272385","doi":"https://doi.org/10.1109/hicss.2007.617","mag":"2172272385"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/hicss.2007.617","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022626159","display_name":"Benjamin Turnbull","orcid":"https://orcid.org/0000-0003-0440-5032"},"institutions":[{"id":"https://openalex.org/I170239107","display_name":"University of South Australia","ror":"https://ror.org/01p93h210","country_code":"AU","type":"funder","lineage":["https://openalex.org/I170239107"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Benjamin Turnbull","raw_affiliation_strings":["University of South Australia, Australia"],"affiliations":[{"raw_affiliation_string":"University of South Australia, Australia","institution_ids":["https://openalex.org/I170239107"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062854609","display_name":"Jill Slay","orcid":"https://orcid.org/0000-0002-2352-8815"},"institutions":[{"id":"https://openalex.org/I170239107","display_name":"University of South Australia","ror":"https://ror.org/01p93h210","country_code":"AU","type":"funder","lineage":["https://openalex.org/I170239107"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jill Slay","raw_affiliation_strings":["University of South Australia, Australia"],"affiliations":[{"raw_affiliation_string":"University of South Australia, Australia","institution_ids":["https://openalex.org/I170239107"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.762,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":12,"citation_normalized_percentile":{"value":0.731283,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":84,"max":85},"biblio":{"volume":null,"issue":null,"first_page":"267a","last_page":"267a"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9984,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9984,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9977,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9977,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/wireless-site-survey","display_name":"Wireless site survey","score":0.49020702},{"id":"https://openalex.org/keywords/network-forensics","display_name":"Network forensics","score":0.43923357}],"concepts":[{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.75351554},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.65564287},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.61505216},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.60891616},{"id":"https://openalex.org/C13021490","wikidata":"https://www.wikidata.org/wiki/Q8026901","display_name":"Wireless site survey","level":5,"score":0.49020702},{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.43923357},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.414273},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.3974594},{"id":"https://openalex.org/C152153834","wikidata":"https://www.wikidata.org/wiki/Q1339878","display_name":"Wi-Fi array","level":4,"score":0.37891147},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34881258},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.33368555},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/hicss.2007.617","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","score":0.47,"id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":9,"referenced_works":["https://openalex.org/W1579371649","https://openalex.org/W1981540394","https://openalex.org/W2010573219","https://openalex.org/W2049512073","https://openalex.org/W2133505575","https://openalex.org/W2146194616","https://openalex.org/W2724725557","https://openalex.org/W310602596","https://openalex.org/W34350232"],"related_works":["https://openalex.org/W2386491072","https://openalex.org/W2379549849","https://openalex.org/W2371947886","https://openalex.org/W2170850604","https://openalex.org/W2110930589","https://openalex.org/W2073628368","https://openalex.org/W197658719","https://openalex.org/W155968509","https://openalex.org/W1512024219","https://openalex.org/W150771570"],"abstract_inverted_index":{"This":[0],"paper":[1],"discusses":[2],"the":[3,16,22,36,51,76,83,97,131,142,153],"need":[4],"for":[5,96,147],"both":[6],"a":[7,59,105,120],"series":[8,121],"of":[9,24,38,61,78,82,101,114,122,136,144,152],"electronic":[10,39],"tools":[11,125],"and":[12,58,68,134,163,171],"procedural":[13,70],"changes":[14],"to":[15,20,35,55,74,104,128,165],"evidence":[17,62,173],"collection":[18,37,52],"process":[19,143],"accommodate":[21],"possibilities":[23],"wireless":[25,28,79,88,106,137,154],"technologies.":[26],"802.11-based":[27],"technologies":[29],"in":[30,63,86,111,130,141],"particular":[31],"pose":[32],"an":[33,112],"issue":[34],"evidence,":[40],"as":[41],"devices":[42,89,102,159,169],"that":[43,91,119,139],"appear":[44],"isolated":[45],"may":[46,160],"be":[47,126,161],"tirelessly":[48],"accessed":[49],"during":[50,170],"phase,":[53],"leading":[54],"after-seizure":[56],"communications":[57],"tampering":[60],"custody.":[64],"Whilst":[65],"forensic":[66,123,148],"acquisition":[67,77],"analysis":[69,133],"guides":[71],"are":[72,140,175],"yet":[73],"discuss":[75],"devices,":[80],"one":[81,109],"core":[84],"issues":[85],"collecting":[87],"is":[90,93,117],"there":[92],"no":[94],"indication":[95],"number":[98],"or":[99],"type":[100],"connected":[103,158],"network,":[107],"should":[108],"exist":[110],"area":[113],"interest.":[115],"It":[116],"proposed":[118],"software":[124],"developed":[127],"aid":[129],"detection,":[132],"control":[135,151],"networks":[138],"being":[145],"seized":[146],"analysis.":[149],"Through":[150],"medium,":[155],"information":[156],"regarding":[157],"gathered":[162],"methods":[164],"prevent":[166],"communication":[167],"between":[168],"after":[172],"seizure":[174],"also":[176],"examined":[177]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2172272385","counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-03-18T08:12:44.749685","created_date":"2016-06-24"}