{"id":"https://openalex.org/W1575444056","doi":"https://doi.org/10.15394/jdfsl.2010.1072","title":"Computer Forensic Functions Testing: Media Preparation, Write Protection and Verification","display_name":"Computer Forensic Functions Testing: Media Preparation, Write Protection and Verification","publication_year":2010,"publication_date":"2010-01-01","ids":{"openalex":"https://openalex.org/W1575444056","doi":"https://doi.org/10.15394/jdfsl.2010.1072","mag":"1575444056"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.15394/jdfsl.2010.1072","pdf_url":"https://commons.erau.edu/cgi/viewcontent.cgi?article=1072&context=jdfsl","source":{"id":"https://openalex.org/S2764592663","display_name":"\u0098The \u009cjournal of digital forensics, security and law","issn_l":"1558-7215","issn":["1558-7215","1558-7223"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":false,"is_core":true,"host_organization":"https://openalex.org/P4310316352","host_organization_name":"Association of Digital Forensics, Security and Law","host_organization_lineage":["https://openalex.org/P4310316352"],"host_organization_lineage_names":["Association of Digital Forensics, Security and Law"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://commons.erau.edu/cgi/viewcontent.cgi?article=1072&context=jdfsl","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090797783","display_name":"Yinghua Guo","orcid":null},"institutions":[{"id":"https://openalex.org/I170239107","display_name":"University of South Australia","ror":"https://ror.org/01p93h210","country_code":"AU","type":"funder","lineage":["https://openalex.org/I170239107"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yinghua Guo","raw_affiliation_strings":["University of South Australia"],"affiliations":[{"raw_affiliation_string":"University of South Australia","institution_ids":["https://openalex.org/I170239107"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062854609","display_name":"Jill Slay","orcid":"https://orcid.org/0000-0002-2352-8815"},"institutions":[{"id":"https://openalex.org/I170239107","display_name":"University of South Australia","ror":"https://ror.org/01p93h210","country_code":"AU","type":"funder","lineage":["https://openalex.org/I170239107"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jill Slay","raw_affiliation_strings":["University of South Australia"],"affiliations":[{"raw_affiliation_string":"University of South Australia","institution_ids":["https://openalex.org/I170239107"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":0,"currency":"USD","value_usd":0},"apc_paid":{"value":0,"currency":"USD","value_usd":0},"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.455956,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":64,"max":71},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.76366353},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.6265297},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.55689734},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.54412705},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.538905},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5084211},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.46094853},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.17314479},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.15394/jdfsl.2010.1072","pdf_url":"https://commons.erau.edu/cgi/viewcontent.cgi?article=1072&context=jdfsl","source":{"id":"https://openalex.org/S2764592663","display_name":"\u0098The \u009cjournal of digital forensics, security and law","issn_l":"1558-7215","issn":["1558-7215","1558-7223"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":false,"is_core":true,"host_organization":"https://openalex.org/P4310316352","host_organization_name":"Association of Digital Forensics, Security and Law","host_organization_lineage":["https://openalex.org/P4310316352"],"host_organization_lineage_names":["Association of Digital Forensics, Security and Law"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":true,"landing_page_url":"https://commons.erau.edu/jdfsl/vol5/iss2/1","pdf_url":null,"source":{"id":"https://openalex.org/S4377196356","display_name":"Scholarly Commons (Embry\u2013Riddle Aeronautical University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I84475105","host_organization_name":"Embry\u2013Riddle Aeronautical University","host_organization_lineage":["https://openalex.org/I84475105"],"host_organization_lineage_names":["Embry\u2013Riddle Aeronautical University"],"type":"repository"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.15394/jdfsl.2010.1072","pdf_url":"https://commons.erau.edu/cgi/viewcontent.cgi?article=1072&context=jdfsl","source":{"id":"https://openalex.org/S2764592663","display_name":"\u0098The \u009cjournal of digital forensics, security and law","issn_l":"1558-7215","issn":["1558-7215","1558-7223"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":false,"is_core":true,"host_organization":"https://openalex.org/P4310316352","host_organization_name":"Association of Digital Forensics, Security and Law","host_organization_lineage":["https://openalex.org/P4310316352"],"host_organization_lineage_names":["Association of Digital Forensics, Security and Law"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"score":0.44,"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":18,"referenced_works":["https://openalex.org/W106406016","https://openalex.org/W134076915","https://openalex.org/W1514071629","https://openalex.org/W1660562555","https://openalex.org/W1748618683","https://openalex.org/W1862271745","https://openalex.org/W2049265431","https://openalex.org/W2058725544","https://openalex.org/W2074400425","https://openalex.org/W2119512023","https://openalex.org/W2133422510","https://openalex.org/W2134575574","https://openalex.org/W2167260922","https://openalex.org/W2169049929","https://openalex.org/W2615833242","https://openalex.org/W310602596","https://openalex.org/W4248226371","https://openalex.org/W4289127653"],"related_works":["https://openalex.org/W4283749635","https://openalex.org/W3003915767","https://openalex.org/W2982120024","https://openalex.org/W2938786841","https://openalex.org/W2444281417","https://openalex.org/W2406407882","https://openalex.org/W2383918176","https://openalex.org/W2380805646","https://openalex.org/W2059761707","https://openalex.org/W1869907491"],"abstract_inverted_index":{"The":[0],"growth":[1],"in":[2,98],"the":[3,35,38,87,99,109,121],"computer":[4,59,90,100],"forensic":[5,30,60,91,101],"field":[6],"has":[7],"created":[8],"a":[9,21,81],"demand":[10],"for":[11,54],"new":[12],"software":[13,27],"(or":[14],"increased":[15],"functionality":[16],"to":[17,23,140,145],"existing":[18],"software)":[19],"and":[20,56,72,83,116,127],"means":[22],"verify":[24],"that":[25,149],"this":[26,43,106,133],"is":[28],"truly":[29],"i.e.":[31,93],"capable":[32],"of":[33,37,40,58,65,86,89,111,124],"meeting":[34],"requirements":[36,70],"trier":[39],"fact.":[41],"In":[42],"work,":[44,134],"we":[45,79,119],"review":[46],"our":[47],"previous":[48],"work---a":[49],"function":[50,68,77,122],"oriented":[51],"testing":[52],"framework":[53,63],"validation":[55],"verification":[57],"tools.":[61],"This":[62],"consists":[64],"three":[66],"parts:":[67],"mapping,":[69,78],"specification":[71],"reference":[73,143],"set":[74],"development.":[75],"Through":[76],"give":[80],"scientific":[82],"systemized":[84],"description":[85],"fundamentals":[88],"discipline,":[92],"what":[94],"functions":[95,110,126],"are":[96],"needed":[97],"investigation":[102],"process.":[103],"We":[104],"focus":[105],"paper":[107],"on":[108,132],"media":[112],"preparation,":[113],"write":[114],"protection":[115],"verification.":[117],"Specifically,":[118],"complete":[120],"mapping":[123],"these":[125,151],"specify":[128],"their":[129],"requirements.":[130],"Based":[131],"future":[135],"work":[136],"can":[137],"be":[138],"conducted":[139],"develop":[141],"corresponding":[142],"sets":[144],"test":[146],"any":[147],"tools":[148],"possess":[150],"functions.":[152]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1575444056","counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2025-03-17T14:46:09.379576","created_date":"2016-06-24"}