{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,8]],"date-time":"2025-05-08T04:48:36Z","timestamp":1746679716934,"version":"3.37.3"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/csr61664.2024.10679452","type":"proceedings-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T17:21:51Z","timestamp":1727198511000},"page":"120-126","source":"Crossref","is-referenced-by-count":1,"title":["Multi-Blockchain Model for IoT Devices Forensic Investigations on Spidernet"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5390-1828","authenticated-orcid":false,"given":"Soraya","family":"Harding","sequence":"first","affiliation":[{"name":"School of Computing, University of Portsmouth,Portsmouth,United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8741-6986","authenticated-orcid":false,"given":"Mo","family":"Adda","sequence":"additional","affiliation":[{"name":"School of Computing, University of Portsmouth,Portsmouth,United Kingdom"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700879"},{"issue":"2","key":"ref2","first-page":"2104","article-title":"Multi-Blockchain-Based Privacy-Preserving Scheme for IoT","volume":"6","author":"Zhang","year":"2019","journal-title":"IEEE Internet of Things Journal"},{"volume-title":"Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World","year":"2016","author":"Tapscott","key":"ref3"},{"journal-title":"European Union Blockchain Observatory and Forum,f","article-title":"Blockchain for the Public Good","year":"2018","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.27"},{"journal-title":"Polkadot: Vision for a Heterogeneous Multi-Chain Framework","year":"2016","author":"Wood","key":"ref6"},{"key":"ref7","first-page":"102900","article-title":"A Secure and Privacy-Aware Data Collection Framework Using Blockchain-Based Multi-Chain Architecture for IoT-Based Healthcare","volume":"173","author":"Al Omar","year":"2021","journal-title":"Journal of Network and Computer Applications"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2920987"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2967218"},{"issue":"78","key":"ref10","article-title":"Blockchain-based Efficient Privacy Preserving and Data Sharing Scheme of Internet of Medical Things","volume":"44","author":"Fan","year":"2020","journal-title":"Journal of Medical Systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.022"},{"key":"ref12","article-title":"Formal Language for Objects Transactions (ObTFL)","author":"Adda","year":"2024","journal-title":"Preprints"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2018.2842460"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IS48319.2020.9200150"},{"key":"ref15","first-page":"120839","article-title":"A Secure Multi-Blockchain Framework for IoT Data Management","volume":"8","author":"Li","year":"2020","journal-title":"IEEE Access"},{"issue":"6","key":"ref16","first-page":"3201","article-title":"Energy-Efficient and Secure Data Storage for Multi-Blockchain-Based Industrial IoT","volume":"15","author":"Wu","year":"2019","journal-title":"IEEE Transactions on Industrial Informatics"}],"event":{"name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2024,9,2]]},"location":"London, United Kingdom","end":{"date-parts":[[2024,9,4]]}},"container-title":["2024 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10679369\/10679342\/10679452.pdf?arnumber=10679452","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T05:23:25Z","timestamp":1727241805000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679452\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/csr61664.2024.10679452","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}