{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T07:36:48Z","timestamp":1763105808628},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,7,15]],"date-time":"2021-07-15T00:00:00Z","timestamp":1626307200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,7,15]],"date-time":"2021-07-15T00:00:00Z","timestamp":1626307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s11227-021-03992-1","type":"journal-article","created":{"date-parts":[[2021,7,15]],"date-time":"2021-07-15T10:04:25Z","timestamp":1626343465000},"page":"3029-3044","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["AI-enabled device digital forensics for smart cities"],"prefix":"10.1007","volume":"78","author":[{"given":"Sungbum","family":"Kim","sequence":"first","affiliation":[]},{"given":"Wooyeon","family":"Jo","sequence":"additional","affiliation":[]},{"given":"Jino","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Taeshik","family":"Shon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,15]]},"reference":[{"issue":"6","key":"3992_CR1","doi-asserted-by":"publisher","first-page":"3184","DOI":"10.1007\/s11227-018-2331-8","volume":"75","author":"V Subramaniyaswamy","year":"2019","unstructured":"Subramaniyaswamy V, Manogaran G, Logesh R, Vijayakumar V, Chilamkurti N, Malathi D, Senthilselvan N (2019) An ontology-driven personalized food recommendation in IoT-based healthcare system. J Supercomput 75(6):3184\u20133216","journal-title":"J Supercomput"},{"key":"3992_CR2","doi-asserted-by":"crossref","unstructured":"Ghahramani, M., Javidan, R., & Shojafar, M. (2020). A secure biometric-based authentication protocol for global mobility networks in smart cities. The Journal of Supercomputing, 1\u201327.","DOI":"10.1007\/s11227-020-03160-x"},{"issue":"8","key":"3992_CR3","doi-asserted-by":"publisher","first-page":"3504","DOI":"10.1007\/s11227-015-1601-y","volume":"74","author":"SA Chaudhry","year":"2018","unstructured":"Chaudhry SA, Naqvi H, Farash MS, Shon T, Sher M (2018) An improved and robust biometrics-based three factor authentication scheme for multiserver environments. J Supercomput 74(8):3504\u20133520","journal-title":"J Supercomput"},{"key":"3992_CR4","unstructured":"Nicole Chavez (2017) Arkansas judge drops murder charge in Amazon Echo case. CNN. https:\/\/edition.cnn.com\/2017\/11\/30\/us\/amazon-echo-arkansas-murder-case-dismissed\/index.html. Accessed 2 December 2017"},{"key":"3992_CR5","unstructured":"Tracy Connor (2017) Fitbit Murder Case: Richard Dabate Pleads Not Guilty in Wife's Death. NBCNEWS. https:\/\/www.nbcnews.com\/news\/us-news\/fitbit-murder-case-richard-dabate-pleads-not-guilty-wife-s-n752526 Accessed 30 Apr 2017"},{"key":"3992_CR6","doi-asserted-by":"crossref","unstructured":"Cosic, J., Schlehuber, C., & Morog, D. (2021, April). Digital Forensic Investigation Process in Railway Environment. In 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS) (pp. 1\u20136). IEEE","DOI":"10.1109\/NTMS49979.2021.9432658"},{"issue":"5","key":"3992_CR7","doi-asserted-by":"publisher","first-page":"4911","DOI":"10.1007\/s12652-020-01931-1","volume":"12","author":"I Jayaraman","year":"2021","unstructured":"Jayaraman I, Panneerselvam AS (2021) A novel privacy preserving digital forensic readiness provable data possession technique for health care data in cloud. J Ambient Intell Humaniz Comput 12(5):4911\u20134924","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"3992_CR8","doi-asserted-by":"crossref","unstructured":"Kim, S., Jo, W., & Shon, T. (2020). APAD: autoencoder-based payload anomaly detection for industrial IoE. Applied Soft Computing, 88, 106017","DOI":"10.1016\/j.asoc.2019.106017"},{"key":"3992_CR9","doi-asserted-by":"publisher","first-page":"77572","DOI":"10.1109\/ACCESS.2020.2989770","volume":"8","author":"S Kwon","year":"2020","unstructured":"Kwon S, Yoo H, Shon T (2020) IEEE 1815.1-based power system security with bidirectional RNN-based network anomalous attack detection for cyber-physical system. IEEE Access 8:77572\u201377586","journal-title":"IEEE Access"},{"key":"3992_CR10","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1016\/j.comcom.2020.02.025","volume":"153","author":"SA Chaudhry","year":"2020","unstructured":"Chaudhry SA, Shon T, Al-Turjman F, Alsharif MH (2020) Correcting design flaws: an improved and cloud assisted key agreement scheme in cyber physical systems. Comput Commun 153:527\u2013537","journal-title":"Comput Commun"},{"key":"3992_CR11","doi-asserted-by":"crossref","unstructured":"Kim, H., Kim, S., Jo, W., Kim, K., & Shon, T. (2021). Unknown Payload Anomaly Detection Based on Format and Field Semantics Inference in Cyber-Physical Infrastructure Systems. IEEE Access","DOI":"10.1109\/ACCESS.2021.3080081"},{"key":"3992_CR12","doi-asserted-by":"crossref","unstructured":"Iqbal, A., Mahmood, F., & Ekstedt, M. (2019). Digital forensic analysis of industrial control systems using sandboxing: A case of wampac applications in the power systems. energies, 12(13), 2598","DOI":"10.3390\/en12132598"},{"key":"3992_CR13","doi-asserted-by":"crossref","unstructured":"Rondeau, C. M., Temple, M. A., & Lopez, J. (2019). Industrial IoT cross\u2010layer forensic investigation. Wiley Interdisciplinary Reviews: Forensic Science, 1(1), e1322","DOI":"10.1002\/wfs2.1322"},{"key":"3992_CR14","doi-asserted-by":"crossref","unstructured":"Losavio, M. M., Chow, K. P., Koltay, A., & James, J. (2018). The Internet of Things and the Smart City: Legal challenges with digital forensics, privacy, and security. Security and Privacy, 1(3), e23","DOI":"10.1002\/spy2.23"},{"key":"3992_CR15","doi-asserted-by":"crossref","unstructured":"Sathwara, S., Dutta, N., & Pricop, E. (2018, June). IoT Forensic A digital investigation framework for IoT systems. In 2018 10th International Conference on Electronics, Computers And Artificial Intelligence (ECAI) (pp. 1\u20134). IEEE","DOI":"10.1109\/ECAI.2018.8679017"},{"key":"3992_CR16","doi-asserted-by":"publisher","first-page":"47566","DOI":"10.1109\/ACCESS.2018.2867466","volume":"6","author":"D Quick","year":"2018","unstructured":"Quick D, Choo KKR (2018) IoT device forensics and data reduction. IEEE Access 6:47566\u201347574","journal-title":"IEEE Access"},{"key":"3992_CR17","doi-asserted-by":"crossref","unstructured":"Feng, X., Dawam, E. S., & Amin, S. (2017). Digital forensics model of smart city automated vehicles challenges","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.47"},{"key":"3992_CR18","doi-asserted-by":"crossref","unstructured":"Goudbeek, A., Choo, K. K. R., & Le-Khac, N. A. (2018, August). A forensic investigation framework for smart home environment. In 2018 17th IEEE international conference on trust, security and privacy in computing and communications\/12th IEEE international conference on big data science and engineering (TrustCom\/BigDataSE) (pp. 1446\u20131451). IEEE","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00201"},{"key":"3992_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comnet.2018.03.024","volume":"138","author":"Q Do","year":"2018","unstructured":"Do Q, Martini B, Choo KKR (2018) Cyber-physical systems information gathering: a smart home case study. Comput Netw 138:1\u201312","journal-title":"Comput Netw"},{"key":"3992_CR20","doi-asserted-by":"crossref","unstructured":"Iqbal, A., Oleg\u00e5rd, J., Ghimire, R., Jamshir, S., & Shalaginov, A. (2020, December). Smart Home Forensics: An Exploratory Study on Smart Plug Forensic Analysis. In 2020 IEEE International Conference on Big Data (Big Data) (pp. 2283\u20132290). IEEE","DOI":"10.1109\/BigData50022.2020.9378183"},{"key":"3992_CR21","doi-asserted-by":"crossref","unstructured":"Dorai, G., Houshmand, S., & Baggili, I. (2018, August). I know what you did last summer: Your smart home Internet of Things and your iPhone forensically ratting you out. In Proceedings of the 13th International Conference on Availability, Reliability and Security (pp. 1\u201310)","DOI":"10.1145\/3230833.3232814"},{"key":"3992_CR22","unstructured":"Philomin, S., Singh, A., Ikuesan, A., & Venter, H. (2020). Digital forensic readiness framework for smart homes. In International Conference on Cyber Warfare and Security (pp. 627-XVIII). Academic Conferences International Limited"},{"key":"3992_CR23","doi-asserted-by":"publisher","first-page":"S38","DOI":"10.1016\/j.diin.2018.04.014","volume":"26","author":"A Awasthi","year":"2018","unstructured":"Awasthi A, Read HO, Xynos K, Sutherland I (2018) Welcome pwn: almond smart home hub forensics. Digit Investig 26:S38\u2013S46","journal-title":"Digit Investig"},{"key":"3992_CR24","unstructured":"Azhar, M. H. B., & Bate, S. B. L. (2019). Recovery of Forensic Artefacts from a Smart Home IoT Ecosystem. IARIA"},{"issue":"8","key":"3992_CR25","doi-asserted-by":"publisher","first-page":"1215","DOI":"10.3390\/electronics9081215","volume":"9","author":"S Kim","year":"2020","unstructured":"Kim S, Park M, Lee S, Kim J (2020) Smart home forensics\u2014data analysis of IoT devices. Electronics 9(8):1215","journal-title":"Electronics"},{"key":"3992_CR26","unstructured":"Hutchinson, S., Yoon, Y. H., Shantaram, N., & Karabiyik, U. Internet of Things Forensics in Smart Homes: Design, Implementation and Analysis of Smart Home Laboratory"},{"key":"3992_CR27","doi-asserted-by":"crossref","unstructured":"Y\u0131ld\u0131r\u0131m, \u0130., Bostanc\u0131, E., & G\u00fczel, M. S. (2019, September). Forensic Analysis with Anti-Forensic Case Studies on Amazon Alexa and Google Assistant Build-In Smart Home Speakers. In 2019 4th International Conference on Computer Science and Engineering (UBMK) (pp. 1\u20133). IEEE","DOI":"10.1109\/UBMK.2019.8907007"},{"key":"3992_CR28","doi-asserted-by":"crossref","unstructured":"Youn, M. A., Lim, Y., Seo, K., Chung, H., & Lee, S. (2021). Forensic Analysis for AI Speaker with Display Echo Show 2nd Generation as a Case Study. Digital Investigation","DOI":"10.1016\/j.fsidi.2021.301130"},{"key":"3992_CR29","doi-asserted-by":"publisher","first-page":"S80","DOI":"10.1016\/j.diin.2019.04.013","volume":"29","author":"W Jo","year":"2019","unstructured":"Jo W, Shin Y, Kim H, Yoo D, Kim D, Kang C, Shon T (2019) Digital forensic practices and methodologies for AI speaker ecosystems. Digit Investig 29:S80\u2013S93","journal-title":"Digit Investig"},{"issue":"4","key":"3992_CR30","doi-asserted-by":"publisher","first-page":"6487","DOI":"10.1109\/JIOT.2019.2906946","volume":"6","author":"S Li","year":"2019","unstructured":"Li S, Choo KKR, Sun Q, Buchanan WJ, Cao J (2019) IoT forensics: Amazon echo as a use case. IEEE Internet Things J 6(4):6487\u20136497","journal-title":"IEEE Internet Things J"},{"key":"3992_CR31","doi-asserted-by":"publisher","first-page":"S15","DOI":"10.1016\/j.diin.2017.06.010","volume":"22","author":"H Chung","year":"2017","unstructured":"Chung H, Park J, Lee S (2017) Digital forensic approaches for Amazon Alexa ecosystem. Digit Investig 22:S15\u2013S25","journal-title":"Digit Investig"},{"key":"3992_CR32","doi-asserted-by":"crossref","unstructured":"Shin, Y., Kim, H., Kim, S., Yoo, D., Jo, W., & Shon, T. (2020). Certificate Injection-Based Encrypted Traffic Forensics in AI Speaker Ecosystem. Forensic Science International: Digital Investigation, 33, 301010","DOI":"10.1016\/j.fsidi.2020.301010"},{"issue":"2","key":"3992_CR33","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1007\/s12083-018-0708-3","volume":"13","author":"S Kang","year":"2020","unstructured":"Kang S, Kim S, Kim J (2020) Forensic analysis for IoT fitness trackers and its application. Peer-to-Peer Net Appl 13(2):564\u2013573","journal-title":"Peer-to-Peer Net Appl"},{"issue":"6","key":"3992_CR34","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1111\/1556-4029.14109","volume":"64","author":"NR Odom","year":"2019","unstructured":"Odom NR, Lindmar JM, Hirt J, Brunty J (2019) Forensic inspection of sensitive user data and artifacts from smartwatch wearable devices. J Forensic Sci 64(6):1673\u20131686","journal-title":"J Forensic Sci"},{"key":"3992_CR35","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.diin.2019.03.007","volume":"29","author":"J Gregorio","year":"2019","unstructured":"Gregorio J, Alarcos B, Gardel A (2019) Forensic analysis of nucleus RTOS on MTK smartwatches. Digit Investig 29:55\u201366","journal-title":"Digit Investig"},{"key":"3992_CR36","doi-asserted-by":"crossref","unstructured":"MacDermott, \u00c1., Lea, S., Iqbal, F., Idowu, I., & Shah, B. (2019, June). Forensic analysis of wearable devices: Fitbit, Garmin and HETP Watches. In 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS) (pp. 1\u20136). IEEE","DOI":"10.1109\/NTMS.2019.8763834"},{"key":"3992_CR37","doi-asserted-by":"crossref","unstructured":"Becirovic, S., & Mrdovic, S. (2019, September). Manual IoT Forensics of a Samsung Gear S3 Frontier Smartwatch. In 2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) (pp. 1\u20135). IEEE","DOI":"10.23919\/SOFTCOM.2019.8903845"},{"key":"3992_CR38","doi-asserted-by":"crossref","unstructured":"Lee, S., Jo, W., Eo, S., & Shon, T. (2019). ExtSFR: scalable file recovery framework based on an Ext file system. Multimedia Tools and Applications, 1\u201319","DOI":"10.1007\/s11042-019-7199-y"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-03992-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-03992-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-03992-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T11:36:12Z","timestamp":1643024172000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-03992-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,15]]},"references-count":38,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["3992"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-03992-1","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,15]]},"assertion":[{"value":"9 July 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 July 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}