{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T00:43:14Z","timestamp":1726015394212},"publisher-location":"Cham","reference-count":51,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030105426"},{"type":"electronic","value":"9783030105433"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-10543-3_7","type":"book-chapter","created":{"date-parts":[[2019,3,22]],"date-time":"2019-03-22T14:03:29Z","timestamp":1553263409000},"page":"153-177","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Forensic Investigation of Cross Platform Massively Multiplayer Online Games: Minecraft as a Case Study"],"prefix":"10.1007","author":[{"given":"Paul J.","family":"Taylor","sequence":"first","affiliation":[]},{"given":"Henry","family":"Mwiki","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Dehghantanha","sequence":"additional","affiliation":[]},{"given":"Alex","family":"Akinbi","sequence":"additional","affiliation":[]},{"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Hammoudeh","sequence":"additional","affiliation":[]},{"given":"Reza M.","family":"Parizi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,23]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"L. Christopher, K.-K. R. Choo, and A. Dehghantanha, Honeypots for Employee Information Security Awareness and Education Training: A Conceptual EASY Training Model. 2016.","DOI":"10.1016\/B978-0-12-805303-4.00008-3"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"A. Azmoodeh, A. Dehghantanha, M. Conti, and K.-K. R. Choo, \u201cDetecting crypto-ransomware in IoT networks based on energy consumption footprint,\u201d J. Ambient Intell. Humaniz. Comput., pp. 1\u201312, Aug. 2017.","DOI":"10.1007\/s12652-017-0558-5"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"S. Walker-Roberts, M. Hammoudeh, and A. Dehghantanha, \u201cA Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure,\u201d IEEE Access, 2018.","DOI":"10.1109\/ACCESS.2018.2817560"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Y.-Y. Teing, D. Ali, K. Choo, M. T. Abdullah, and Z. Muda, \u201cGreening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study,\u201d IEEE Trans. Sustain. Comput., pp. 1\u20131, 2017.","DOI":"10.1109\/TSUSC.2017.2687103"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Y.-Y. Teing, A. Dehghantanha, and K.-K. R. Choo, \u201cCloudMe forensics: A case of big data forensic investigation,\u201d Concurr. Comput., 2017.","DOI":"10.1002\/cpe.4277"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"D. Kiwia, A. Dehghantanha, K.-K. R. Choo, and J. Slaughter, \u201cA cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence,\u201d J. Comput. Sci., Nov. 2017.","DOI":"10.1016\/j.jocs.2017.10.020"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"M. Hopkins and A. Dehghantanha, \u201cExploit Kits: The production line of the Cybercrime economy?,\u201d in 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec), 2015, pp. 23\u201327.","DOI":"10.1109\/InfoSec.2015.7435501"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"A. Shalaginov, S. Banin, A. Dehghantanha, and K. Franke, \u201cMachine Learning Aided Static Malware Analysis: A Survey and Tutorial,\u201d 2018, pp. 7\u201345.","DOI":"10.1007\/978-3-319-73951-9_2"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"H. H. Pajouh, A. Dehghantanha, R. Khayami, and K.-K. R. Choo, \u201cIntelligent OS X malware threat detection with code inspection,\u201d J. Comput. Virol. Hacking Tech., 2017.","DOI":"10.1007\/s11416-017-0307-5"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"M. Petraityte, A. Dehghantanha, and G. Epiphaniou, A model for android and iOS applications risk calculation: CVSS analysis and enhancement using case-control studies, vol. 70. 2018.","DOI":"10.1007\/978-3-319-73951-9_11"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Y.-Y. Teing, A. Dehghantanha, K.-K. R. Choo, and L. T. Yang, \u201cForensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study,\u201d Comput. Electr. Eng., vol. 58, pp. 350\u2013363, Feb. 2017.","DOI":"10.1016\/j.compeleceng.2016.08.020"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"H. HaddadPajouh, A. Dehghantanha, R. Khayami, and K.-K. R. Choo, \u201cA deep Recurrent Neural Network based approach for Internet of Things malware threat hunting,\u201d Futur. Gener. Comput. Syst., 2018.","DOI":"10.1016\/j.future.2018.03.007"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"M. Conti, A. Dehghantanha, K. Franke, and S. Watson, \u201cInternet of Things security and forensics: Challenges and opportunities,\u201d Futur. Gener. Comput. Syst., vol. 78, pp. 544\u2013546, Jan. 2018.","DOI":"10.1016\/j.future.2017.07.060"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"G. Epiphaniou, P. Karadimas, D. K. Ben Ismail, H. Al-Khateeb, A. Dehghantanha, and K.-K. R. Choo, \u201cNon-Reciprocity Compensation Combined with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks,\u201d IEEE Internet Things J., pp. 1\u20131, 2017.","DOI":"10.1109\/JIOT.2017.2764384"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"O. Osanaiye, H. Cai, K.-K. R. Choo, A. Dehghantanha, Z. Xu, and M. Dlodlo, \u201cEnsemble-based multi-filter feature selection method for DDoS detection in cloud computing,\u201d EURASIP J. Wirel. Commun. Netw., vol. 2016, no. 1, p. 130, May 2016.","DOI":"10.1186\/s13638-016-0623-3"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"S. Homayoun, M. Ahmadzadeh, S. Hashemi, A. Dehghantanha, and R. Khayami, \u201cBoTShark: A Deep Learning Approach for Botnet Traffic Detection,\u201d 2018, pp. 137\u2013153.","DOI":"10.1007\/978-3-319-73951-9_7"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"S. Homayoun, A. Dehghantanha, M. Ahmadzadeh, S. Hashemi, and R. Khayami, \u201cKnow Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence,\u201d {IEEE} Trans. Emerg. Top. Comput., p. 1, 2017.","DOI":"10.1109\/TETC.2017.2756908"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"A. Azmoodeh, A. Dehghantanha, and K.-K. R. Choo, \u201cRobust Malware Detection for Internet Of (Battlefield) Things Devices Using Deep Eigenspace Learning,\u201d IEEE Trans. Sustain. Comput., pp. 1\u20131, 2018.","DOI":"10.1109\/TSUSC.2018.2809665"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"K. R. Choo, \u201cOnline child grooming: a literature review on the misuse of social networking sites for grooming children for sexual offences,\u201d Aust. Inst. Criminol., p. 132, 2009.","DOI":"10.1037\/e582922012-001"},{"key":"7_CR20","unstructured":"L.-K. Bernstein, \u201cInvestigating and Prosecuting Swatting Crimes,\u201d United States Atty. Bull., vol. 64, no. 3, pp. 51\u201356, 2016."},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"A. Carpinteri, B. Bang, K. Klimley, R. A. Black, and V. B. Van Hasselt, \u201cCommercial Sexual Exploitation of Children: an Assessment of Offender Characteristics,\u201d J. Police Crim. Psychol., Aug. 2017.","DOI":"10.1007\/s11896-017-9242-0"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"H. Hillman, C. Hooper, and K.-K. R. Choo, \u201cOnline child exploitation: Challenges and future research directions,\u201d Comput. Law Secur. Rev., vol. 30, no. 6, pp. 687\u2013698, Dec. 2014.","DOI":"10.1016\/j.clsr.2014.09.007"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"L. Achternbosch, C. Miller, C. Turville, and P. Vamplew, \u201cGriefers versus the Griefed - what motivates them to play Massively Multiplayer Online Role-Playing Games\u00a0?,\u201d Comput. Games J. Ltd, vol. 3, no. 1, 2014.","DOI":"10.1007\/BF03392354"},{"key":"7_CR24","unstructured":"E. M. Jaffe, \u201cArticle\u00a0: Swatting\u00a0: the New Cyberbullying Frontier After Elonis V. United States,\u201d Drake Law Rev., pp. 455\u2013483, 2016."},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"A. Choo and A. May, \u201cMaintaining Long Distance Togetherness Synchronous Communication with Minecraft and Skype,\u201d in Games Innovation Conference (IGIC), 2013 IEEE International, 2013.","DOI":"10.1109\/IGIC.2013.6659138"},{"key":"7_CR26","unstructured":"A. Noroozian, M. Korczy\u0144ski, C. H. Ga\u00f1an, D. Makita, K. Yoshioka, and M. van Eeten, \u201cWho Gets the Boot? Analyzing Victimization by DDoS-as-a-Service,\u201d in Research in Attacks, Intrusions, and Defenses: 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings, F. Monrose, M. Dacier, G. Blanc, and J. Garcia-Alfaro, Eds. Cham: Springer International Publishing, 2016, pp. 368\u2013389."},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"J. Taylor, \u201cOnline investigations: protection for child victims by raising awareness,\u201d ERA Forum, vol. 16, no. 3, pp. 349\u2013358, 2015.","DOI":"10.1007\/s12027-015-0386-z"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"S. Khanji, R. Jabir, F. Iqbal, and A. Marrington, \u201cForensic analysis of xbox one and playstation 4 gaming consoles,\u201d 8th IEEE Int. Work. Inf. Forensics Secur. WIFS 2016, 2017.","DOI":"10.1109\/WIFS.2016.7823917"},{"key":"7_CR29","unstructured":"M. Cheah, L. Wyndham-Birch, and B. Bird, \u201cWhat artifacts of evidentiary value can be found when investigating multi-user virtual environments.\u201d 2015."},{"key":"7_CR30","unstructured":"\u201cWhat OS for server? - Server Administration - Server Support - Support - Minecraft Forum - Minecraft Forum.\u201d ."},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"D. Quick and K.-K. R. Choo, \u201cGoogle Drive: Forensic analysis of data remnants,\u201d J. Netw. Comput. Appl., vol. 40, pp. 179\u2013193, Apr. 2014.","DOI":"10.1016\/j.jnca.2013.09.016"},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"D. Quick and K.-K. R. Choo, \u201cDropbox analysis: Data remnants on user machines,\u201d Digit. Investig., vol. 10, no. 1, pp. 3\u201318, Jun. 2013.","DOI":"10.1016\/j.diin.2013.02.003"},{"key":"7_CR33","unstructured":"L. C. for D. Investigation, \u201c1\/21\/2016 175,\u201d Leahy Center for Digital Investigation, no. 802. 2016."},{"key":"7_CR34","unstructured":"A. Rutkin, \u201cYour place or Minecraft?,\u201d New Sci., vol. 230, no. 3071, pp. 22\u201323, 2016."},{"key":"7_CR35","unstructured":"\u201cMojang - Minecon 2015 - Day Two - Twitch.\u201d ."},{"key":"7_CR36","doi-asserted-by":"crossref","unstructured":"Z. Zhang, H. Anada, J. Kawamoto, and K. Sakurai, \u201cDetection of illegal players in massively multiplayer online role playing game by classification algorithms,\u201d Proc. - Int. Conf. Adv. Inf. Netw. Appl. AINA, vol. 2015\u2013April, pp. 406\u2013413, 2015.","DOI":"10.1109\/AINA.2015.214"},{"key":"7_CR37","doi-asserted-by":"crossref","unstructured":"Y. Ki, J. Woo, and H. K. Kim, \u201cIdentifying Spreaders of Malicious Behaviors in Online Games,\u201d in Proceedings of the 23rd International Conference on World Wide Web, 2014, pp. 315\u2013316.","DOI":"10.1145\/2567948.2577335"},{"key":"7_CR38","doi-asserted-by":"crossref","unstructured":"J. Oh, Z. H. Borbora, and J. Srivastava, \u201cAutomatic Detection of Compromised Accounts in MMORPGs,\u201d in 2012 International Conference on Social Informatics, 2012, pp. 222\u2013227.","DOI":"10.1109\/SocialInformatics.2012.69"},{"key":"7_CR39","doi-asserted-by":"crossref","unstructured":"A. S. V Nair and B. A. S. Ajeena, \u201cA Log Based Strategy for Fingerprinting and Forensic Investigation of Online Cyber Crimes,\u201d in Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing, 2014, p. 7:1--7:5.","DOI":"10.1145\/2660859.2660912"},{"key":"7_CR40","doi-asserted-by":"crossref","unstructured":"M. Barni and B. Tondi, \u201cThreat Models and Games for Adversarial Multimedia Forensics,\u201d in Proceedings of the 2nd International Workshop on Multimedia Forensics and Security, 2017, pp. 11\u201315.","DOI":"10.1145\/3078897.3080533"},{"key":"7_CR41","doi-asserted-by":"crossref","unstructured":"S. Rajendran and N. P. Gopalan, \u201cMobile Forensic Investigation (MFI) Life Cycle Process for Digital Data Discovery (DDD),\u201d in Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2, L. P. Suresh and B. K. Panigrahi, Eds. New Delhi: Springer India, 2016, pp. 393\u2013403.","DOI":"10.1007\/978-81-322-2674-1_37"},{"key":"7_CR42","doi-asserted-by":"crossref","unstructured":"T. Dargahi, A. Dehghantanha, and M. Conti, \u201cChapter 2 - Forensics Analysis of Android Mobile VoIP Apps,\u201d in Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, K.-K. R. Choo and A. Dehghantanha, Eds. Syngress, 2017, pp. 7\u201320.","DOI":"10.1016\/B978-0-12-805303-4.00002-2"},{"key":"7_CR43","doi-asserted-by":"crossref","unstructured":"K. K. R. Choo and A. Dehghantanha, Contemporary Forensic Investigation of Cloud and Mobile Applications. 2017.","DOI":"10.1016\/B978-0-12-805303-4.00001-0"},{"key":"7_CR44","unstructured":"ACPO, \u201cACPO Good Practice Guide for Digital Evidence,\u201d Association of Chief Police Officers, 2012."},{"key":"7_CR45","unstructured":"N. C. J. U.S. Department of Justice, \u201cElectronic Crime Scene Investigation: A Guide for First Responders,\u201d NIJ Res. Rep., no. NCJ 187736, p. 96, 2001."},{"key":"7_CR46","unstructured":"F. S. Regulator, \u201cCodes of Practice and Conduct Issue 4,\u201d 2017."},{"key":"7_CR47","doi-asserted-by":"crossref","unstructured":"K. Kent, S. Chevalier, T. Grance, and H. Dang, \u201cGuide to Integrating Forensic Techniques into Incident Response,\u201d The National Institute of Standards and Technology, 2006.","DOI":"10.6028\/NIST.SP.800-86"},{"key":"7_CR48","unstructured":"A. Antwi-Boasiako and H. Venter, \u201cA Model for Digital Evidence Admissibility Assessment,\u201d in Advances in Digital Forensics XIII: 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers, G. Peterson and S. Shenoi, Eds. Cham: Springer International Publishing, 2017, pp. 23\u201338."},{"key":"7_CR49","doi-asserted-by":"crossref","unstructured":"B. Martini and K.-K. R. Choo, \u201cAn integrated conceptual digital forensic framework for cloud computing,\u201d Digit. Investig., vol. 9, no. 2, pp. 71\u201380, Nov. 2012.","DOI":"10.1016\/j.diin.2012.07.001"},{"key":"7_CR50","doi-asserted-by":"crossref","unstructured":"Y.-Y. Teing, D. Ali, K.-K. R. Choo, M. Conti, and T. Dargahi, \u201cForensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study,\u201d J. Forensics Sci., vol. [In Press], 2016.","DOI":"10.1111\/1556-4029.13271"},{"key":"7_CR51","doi-asserted-by":"crossref","unstructured":"T. Alstad et al., \u201cMinecraft computer game performance analysis and network traffic emulation by a custom bot,\u201d Proc. 2015 Sci. Inf. Conf. SAI 2015, pp. 227\u2013236, 2015.","DOI":"10.1109\/SAI.2015.7237149"}],"container-title":["Handbook of Big Data and IoT Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-10543-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,14]],"date-time":"2022-09-14T02:33:56Z","timestamp":1663122836000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-10543-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030105426","9783030105433"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-10543-3_7","relation":{},"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"23 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}