{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:18:28Z","timestamp":1760141908537,"version":"build-2065373602"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,17]]},"DOI":"10.1109\/acit65614.2025.11185683","type":"proceedings-article","created":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:50:58Z","timestamp":1760032258000},"page":"481-486","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing European Cyber Forensics: A Computational Intelligence Approach for Detecting Illicit Money Flows"],"prefix":"10.1109","author":[{"given":"Bogdan","family":"Adamyk","sequence":"first","affiliation":[{"name":"Aston University,Department of Business Analytics and Information Systems,Birmingham,United Kingdom"}]},{"given":"Vladlena","family":"Benson","sequence":"additional","affiliation":[{"name":"Aston University,Department of Business Analytics and Information Systems,Birmingham,United Kingdom"}]},{"given":"Oksana","family":"Adamyk","sequence":"additional","affiliation":[{"name":"Loughborough University,Loughborough Business School, Accounting and Finance Group,Loughborough,United Kingdom"}]},{"given":"Ruslan","family":"Shevchuk","sequence":"additional","affiliation":[{"name":"University of Bielsko-Biala,Department of Computer Science and Automatics,Bielsko-Biala,Poland"}]},{"given":"Haider","family":"Al-Khateeb","sequence":"additional","affiliation":[{"name":"Aston University,Department of Business Analytics and Information Systems,Birmingham,United Kingdom"}]},{"given":"Bo\u017cena","family":"Fraczek","sequence":"additional","affiliation":[{"name":"University of Economics,Department of Banking and Financial Markets,Katowice,Poland"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.14254\/2071-8330.2024\/17-2\/12"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.5430\/afr.v13n2p167"},{"year":"2023","author":"LLP","article-title":"The Role of Digital Forensics in Fighting and Preventing Cybercrime","key":"ref3"},{"author":"Awati","article-title":"What is computer forensics? Definition from TechTarget","key":"ref4"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.59022\/ijlp.156"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1016\/j.fsidi.2023.301675"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.53841\/bpsadm.2024.16.1.42"},{"year":"2024","article-title":"Internet Organized Crime Threat Assessment (IOCTA) 2024","key":"ref8"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1016\/j.fsidi.2023.301675"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1007\/978-981-16-6683-4_11"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/s10207-023-00680-4"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.23919\/indiacom61295.2024.10498752"},{"issue":"4","key":"ref13","first-page":"101","article-title":"Admissibility of AI expert testimony","volume":"51","author":"Jurs","year":"2024","journal-title":"Pepperdine Law Rev"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/acit62333.2024.10712606"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1080\/00450618.2018.1554090"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1201\/9780429324932-20"},{"volume-title":"Chainalysis.com","year":"2023","article-title":"Cryptocurrency investigations","key":"ref17"},{"year":"2024","author":"Wolford","article-title":"EU GDPR","key":"ref18"},{"key":"ref19","article-title":"Privacy in forensic examinations","volume":"40","author":"Horsman","year":"2022","journal-title":"Forensic Sci. Int.: Digital Invest"},{"volume-title":"Regulation (Eu) 2023\/1543 Of the European Parliament and of the Council of 12 July 2023 on European Production Orders and European Preservation Orders for electronic evidence in criminal proceedings and for the execution of custodial sentences following criminal proceedings","year":"2023","key":"ref20"}],"event":{"name":"2025 15th International Conference on Advanced Computer Information Technologies (ACIT)","start":{"date-parts":[[2025,9,17]]},"location":"Sibenik, Croatia","end":{"date-parts":[[2025,9,19]]}},"container-title":["2025 15th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11185059\/11185456\/11185683.pdf?arnumber=11185683","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T05:24:54Z","timestamp":1760073894000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11185683\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,17]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/acit65614.2025.11185683","relation":{},"subject":[],"published":{"date-parts":[[2025,9,17]]}}}