{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:20:25Z","timestamp":1759134025491},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,7,23]],"date-time":"2018-07-23T00:00:00Z","timestamp":1532304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s11036-018-1091-2","type":"journal-article","created":{"date-parts":[[2018,7,23]],"date-time":"2018-07-23T14:59:33Z","timestamp":1532357973000},"page":"829-838","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["The Digital Fingerprinting Analysis of Generic Twitter Sessions from Internet of Things Security Aspect"],"prefix":"10.1007","volume":"24","author":[{"given":"Hai-Cheng","family":"Chu","sequence":"first","affiliation":[]},{"given":"Chun-Hsien","family":"Sung","sequence":"additional","affiliation":[]},{"given":"Hui-Lin","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,23]]},"reference":[{"key":"1091_CR1","doi-asserted-by":"crossref","unstructured":"Xu T, Wendt JB, Potkonjak M (2014) Security of IoT systems: design challenges and opportunities. In: Proceedings of the IEEE\/ACM International Conference on Computer-Aided Design (ICCAD \u201814), p 417\u2013423","DOI":"10.1109\/ICCAD.2014.7001385"},{"key":"1091_CR2","unstructured":"Plonka D Measurement and analysis for the Internet of Things, last visited July 18, 2016, \n                    https:\/\/www.ietf.org\/proceedings\/96\/slides\/slides-96-maprg-8.pdf"},{"issue":"3","key":"1091_CR3","doi-asserted-by":"publisher","first-page":"1294","DOI":"10.1109\/COMST.2015.2388550","volume":"17","author":"J Granjal","year":"2015","unstructured":"Granjal J, Monteiro E, S\u00e1 Silva J (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutorials 17(3):1294\u20131312","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"5","key":"1091_CR4","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1109\/JIOT.2014.2359538","volume":"1","author":"C Hennebert","year":"2014","unstructured":"Hennebert C, Dos Santos J (2014) Security protocols and privacy issues into 6LoWPAN stack: a synthesis. IEEE Internet Things J 1(5):384\u2013398","journal-title":"IEEE Internet Things J"},{"key":"1091_CR5","doi-asserted-by":"crossref","unstructured":"Qiu T, Liu J, Si W, Han M, Ning H, Atiquzzaman M (2017) A Data-driven robustness algorithm for the internet of things in smart cities - IEEE Communications Magazine","DOI":"10.1109\/MCOM.2017.1700247"},{"key":"1091_CR6","doi-asserted-by":"publisher","unstructured":"Deng DJ, Lien S, Lee J, Chen KC (2016) On quality-of-service provisioning in IEEE 802.11ax WLANs, IEEE Access, Vol. 4, p 6086-6104. \n                    https:\/\/doi.org\/10.1109\/ACCESS.2016.2602281","DOI":"10.1109\/ACCESS.2016.2602281"},{"key":"1091_CR7","doi-asserted-by":"crossref","unstructured":"Chun WS, Park DW (2012) A study on the forensic data extraction method for sms, photo and mobile image of google android and windows mobile smart phone. In: Convergence and hybrid information technology CCIS. Berlin.310, 654-663. Springer, Heidelberg","DOI":"10.1007\/978-3-642-32692-9_82"},{"issue":"8","key":"1091_CR8","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/MCOM.2017.1601165","volume":"55","author":"DJ Deng","year":"2017","unstructured":"Deng DJ, Lien S, Lin C, Hung S, Chen W (2017) Latency control in software defined cloud\/edge vehicular networking. IEEE Commun Mag 55(8):87\u201393","journal-title":"IEEE Commun Mag"},{"key":"1091_CR9","volume-title":"Privacy and security for cloud computing. Computer communications and networks","author":"S Pearson","year":"2013","unstructured":"Pearson S (2013) Privacy, security and trust in cloud computing. In: Pearson S, Yee G (eds) Privacy and security for cloud computing. Computer communications and networks. Springer, London"},{"key":"1091_CR10","doi-asserted-by":"crossref","unstructured":"Hogan M, Liu F, Sokol A, Tong J (2011) NIST Cloud Computing Standards Roadmap. NIST SP 500-291, National Institute of Standards and Technology","DOI":"10.6028\/NIST.SP.500-291v1"},{"key":"1091_CR11","doi-asserted-by":"crossref","unstructured":"Birk D, Wegener C (2011) Technical issues of forensic investigations in cloud computing environments. 2011 IEEE sixth international workshop on systematic approaches to digital forensic engineering (SADFE) May: 1-10","DOI":"10.1109\/SADFE.2011.17"},{"key":"1091_CR12","doi-asserted-by":"crossref","unstructured":"Damopoulos D, Kambourakis G, Gritzalis S (2011) iSAM: an iphone stealth airborne malware. In: Proceedings of the 26th IFIP TC-11 international information security conference, IFIP advances in information and communication technology \u2013 IFIP AICT.17-28. Springer","DOI":"10.1007\/978-3-642-21424-0_2"},{"issue":"Supplement","key":"1091_CR13","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.diin.2013.06.010","volume":"10","author":"J Dykstra","year":"2013","unstructured":"Dykstra J, Sherman AT (2013) Design and implementation of FROST: digital forensic tools for the OpenStack cloud computing platform. Digit Investig 10(Supplement):87\u201395","journal-title":"Digit Investig"},{"issue":"2","key":"1091_CR14","first-page":"28","volume":"4","author":"G Grispos","year":"2012","unstructured":"Grispos G, Storer T, Glisson W (2012) Calm before the storm: the challenges of cloud computing in digital forensics. IJDCF 4(2):28\u201348","journal-title":"IJDCF"},{"key":"1091_CR15","doi-asserted-by":"crossref","unstructured":"Reilly D, Wren C, Berry T (2011) Cloud computing: pros and cons for computer forensic investigators. International Journal Multimedia and Image Processing (IJMIP) 1(1)","DOI":"10.20533\/ijmip.2042.4647.2011.0004"},{"key":"1091_CR16","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.diin.2010.08.003","volume":"7","author":"F Rehault","year":"2010","unstructured":"Rehault F (2010) Windows mobile advanced forensics: an alternative to existing tools. Digit Investig 7:38\u201347","journal-title":"Digit Investig"},{"issue":"1","key":"1091_CR17","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1109\/JSYST.2013.2256320","volume":"8","author":"C Lin","year":"2014","unstructured":"Lin C, Chin C, Deng DJ (Mar. 2014) Dynamic multi-service load balancing in cloud-based multimedia system. IEEE Syst J 8(1):225\u2013234","journal-title":"IEEE Syst J"},{"key":"1091_CR18","unstructured":"National Telecommunications & Information Administration Internet of things, last visited April 27, 2017, \n                    https:\/\/www.ntia.doc.gov\/category\/internetthings"},{"key":"1091_CR19","doi-asserted-by":"crossref","unstructured":"Wang G, Atiquzzaman M, Yan Z, Choo KKR (2017) Security, Privacy, and Anonymity in Computation, Communication, and Storage: 10th International Conference, Spaccs 2017, Guangzhou, China, December 12-15, 2017, Proceedings","DOI":"10.1007\/978-3-319-72389-1"},{"key":"1091_CR20","doi-asserted-by":"crossref","unstructured":"Arrifin A, D\u2019Orazio C, Choo K, Slay J (2013) ios forensics: how can we recover deleted image files with timestamp in a forensically sound manner? In: 2013 international conference on availability, reliability and security, p 375-382","DOI":"10.1109\/ARES.2013.50"},{"key":"1091_CR21","doi-asserted-by":"crossref","unstructured":"Lu R, Lin X, Liang X, Shen XS (2010) Secure provenance: the essential of bread and butter of data forensics in cloud computing. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS \u201810) (New York, NY, USA), ACM, p 282-292","DOI":"10.1145\/1755688.1755723"},{"key":"1091_CR22","unstructured":"Sasidharan S, Thomas K (2011) Blackberry forensics: an agent based approach for database acquisition. In: Abraham A, Lloret Mauri J, Buford J, Suzuki J, Thampi S (eds) Advances in computing and communications. CCIS. Springer, Berlin, Heidelberg 190:552\u2013561"},{"key":"1091_CR23","unstructured":"Dykstra J, Sherman AT (2011) Understanding issues in cloud forensics: two hypothetical case studies. Proceedings of the 2011 ADFSL Conference on digital forensics security and law, p 191\u2013206"},{"key":"1091_CR24","unstructured":"James JI, Shosha AF, Gladyshev P (2012) Digital forensic investigation and cloud computing. Cybercrime and cloud forensics: applications for investigation processes, Ed. Ruan K, IGI Global, p 1-41"},{"issue":"4","key":"1091_CR25","first-page":"195","volume":"1","author":"S Zawoad","year":"2012","unstructured":"Zawoad S, Hasan R (2012) Towards building proofs of past data possession in cloud forensics. AJSE 1(4):195\u2013207","journal-title":"AJSE"},{"key":"1091_CR26","doi-asserted-by":"crossref","unstructured":"Marty R (2011) Cloud application logging for forensics. Proceedings of the 2011 ACM Symposium on Applied Computing (SAC\u201911), Taichung, Taiwan. ACM, p 178\u2013184","DOI":"10.1145\/1982185.1982226"},{"key":"1091_CR27","unstructured":"Belkasoft: Capture Live RAM Contents with Free Tool from Belkasoft! \n                    https:\/\/belkasoft.com\/ram-capturer"},{"key":"1091_CR28","unstructured":"ARC Group: Assist Organizational Victims of Data Breach. \n                    http:\/\/www.arcgroupny.com"},{"key":"1091_CR29","unstructured":"Epoch Converter: Epoch & Unix Timestamp Conversion Tools. \n                    http:\/\/www.epochconverter.com"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1091-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-018-1091-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1091-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T19:17:45Z","timestamp":1563823065000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-018-1091-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,23]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["1091"],"URL":"https:\/\/doi.org\/10.1007\/s11036-018-1091-2","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,23]]},"assertion":[{"value":"23 July 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}