{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:16:23Z","timestamp":1730193383406,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/5gwf.2018.8516940","type":"proceedings-article","created":{"date-parts":[[2018,11,6]],"date-time":"2018-11-06T02:10:36Z","timestamp":1541470236000},"page":"191-196","source":"Crossref","is-referenced-by-count":1,"title":["An Overview of Proactive Forensic Solutions and its Applicability to 5G"],"prefix":"10.1109","author":[{"given":"Ana","family":"Nieto","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2010.62"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30436-1_21"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.1600087NM"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SADFE.2011.16"},{"key":"ref14","article-title":"A layered approach to insider threat detection and proactive forensics","author":"bradford","year":"2005","journal-title":"Proceedings of the Twenty-First Annual Computer Security Applications Conference (Technology Blitz)"},{"key":"ref15","first-page":"101","article-title":"Guidelines on mobile device forensics (draft)","volume":"800","author":"ayers","year":"2013","journal-title":"NIST Special Publication"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2016.34"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2017.01.007"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2017.01.012"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14722\/sent.2014.23002"},{"key":"ref4","first-page":"1","article-title":"Cyberattack surface of the next-generation mobile networks","author":"sharevski","year":"2016","journal-title":"Protecting Mobile Networks and Devices Challenges and Solutions"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/11427995_82"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6553676"},{"key":"ref5","first-page":"299","article-title":"Wait a minute! a fast, cross-vm attack on aes","author":"irazoqui","year":"2014","journal-title":"International Workshop on Recent Advances in Intrusion Detection"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.299","article-title":"Implementing chain of custody requirements in database audit records for forensic purposes","author":"flores armas","year":"2017"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491220"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781316417744"},{"article-title":"Threat landscape and good practice guide for software defined networks\/5g","year":"2015","author":"belmonte martin","key":"ref1"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/978-3-642-23141-4_9","article-title":"The proactive and reactive digital forensics investigation process: A systematic literature review","author":"alharbi","year":"2011","journal-title":"International Conference on Information Security and Assurance"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"102s","DOI":"10.1016\/j.diin.2015.01.014","article-title":"Leveraging cybox to standardize representation and exchange of digital forensic information","volume":"12","author":"casey","year":"2015","journal-title":"Digital Investigation"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2014.03.007"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"985","DOI":"10.1016\/j.sysarc.2013.07.009","article-title":"Wevan&#x2013;a mechanism for evidence creation and verification in vanets","volume":"59","author":"de fuentes","year":"2013","journal-title":"Journal of Systems Architecture"},{"key":"ref23","article-title":"Volkswagen entertainment system forensics","author":"daniel jacob","year":"2017","journal-title":"16th IEEE International Conference On Trust Security And Privacy In Computing And Communications (TrustCom 2017)"}],"event":{"name":"2018 IEEE 5G World Forum (5GWF)","start":{"date-parts":[[2018,7,9]]},"location":"Silicon Valley, CA","end":{"date-parts":[[2018,7,11]]}},"container-title":["2018 IEEE 5G World Forum (5GWF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8489870\/8516707\/08516940.pdf?arnumber=8516940","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T22:42:23Z","timestamp":1598222543000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8516940\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/5gwf.2018.8516940","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}