{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T15:31:01Z","timestamp":1778167861266,"version":"3.51.4"},"reference-count":54,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,2,26]],"date-time":"2024-02-26T00:00:00Z","timestamp":1708905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,2,26]],"date-time":"2024-02-26T00:00:00Z","timestamp":1708905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,2,26]]},"DOI":"10.1109\/iccr61006.2024.10532850","type":"proceedings-article","created":{"date-parts":[[2024,5,22]],"date-time":"2024-05-22T17:32:41Z","timestamp":1716399161000},"page":"1-8","source":"Crossref","is-referenced-by-count":23,"title":["Overview of Challenges Faced by Digital Forensic"],"prefix":"10.1109","author":[{"given":"Hussam N.","family":"Fakhouri","sequence":"first","affiliation":[{"name":"University of Petra,Faculty of Information Technology,Data Science and Artificial Intelligence Department,Amman,Jordan"}]},{"given":"Mohammad A.","family":"AlSharaiah","sequence":"additional","affiliation":[{"name":"Al-Ahliyya Amman University,Data Science and Artificial Intelligence Department,Amman,Jordan"}]},{"given":"Ahmad k.","family":"Al hwaitat","sequence":"additional","affiliation":[{"name":"The University of Jordan Amman,Amman,Jordan"}]},{"given":"Mohannad","family":"Alkalaileh","sequence":"additional","affiliation":[{"name":"College of Education, Al Ain University,Humanities and Social Sciences,Al-Ain City,United Arab Emirates"}]},{"given":"Fawzi Fayez","family":"Dweikat","sequence":"additional","affiliation":[{"name":"Hamdan Bin Mohammed Smart University,Chancellor Office,United Arab Emirates"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1047671.1047703"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2007.01.010"},{"key":"ref3","article-title":"A road map for digital forensic research: DFRWS Technical Report","year":"2001","journal-title":"DTR-T001\u201301 FINAL"},{"key":"ref4","first-page":"27","article-title":"Text classification based on limited bibliographic metadata","volume-title":"Proceedings of the fourth IEEE international conference on digital information management, ICDIM 2009","author":"Denecke"},{"key":"ref5","first-page":"185","article-title":"Time-based data forensic and cross-reference analysis","volume-title":"Proceedings of the ACM Symposium on Applied Computing 2011","author":"Ding"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2008.05.003"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4379(93)90034-x"},{"key":"ref8","article-title":"Data hiding in journaling file systems","volume-title":"the 5th annual digital forensic research workshop (DFRWS05)","author":"Eckstein"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2006.06.046"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-73742-3_24"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2011.04.001"},{"key":"ref12","volume-title":"2010 Gallup computer crime survey","author":"Politics","year":"2010"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3154059"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2060484"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.44"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2022.121174"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.94452"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1113034.1113076"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.06.007"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.06.011"},{"issue":"1","key":"ref21","first-page":"1","article-title":"Forensics and SIM cards: an overview","volume":"5","author":"Casadei","year":"2006","journal-title":"International Journal of Digital Evidence"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2008.05.008"},{"key":"ref23","volume-title":"Digital evidence and computer crime: forensic science, computers and the internet","author":"Casey","year":"2011"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1113034.1113068"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2007.01.004"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPC51351.2021.9451718"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.07.006"},{"issue":"400","key":"ref28","first-page":"1836","article-title":"Cloud computing: challenges and future directions","volume-title":"Trends and issues in crime and criminal justice","author":"Kim-Kwang","year":"2010"},{"issue":"408","key":"ref29","first-page":"1836","article-title":"Cyber threat landscape faced by the financial and insurance industry","volume-title":"Trends and issues in crime and criminal justice","author":"Kim-Kwang","year":"2011"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1117\/12.649775"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SADFE.2007.22"},{"issue":"1","key":"ref32","first-page":"1","article-title":"An extended model for cybercrime investigations","volume":"3","author":"Ciardhuain","year":"2004","journal-title":"International Journal of Digital Evidence"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2008.05.016"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2009.06.010"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1113034.1113071"},{"key":"ref36","first-page":"1","article-title":"Survey of disk image storage formats","volume-title":"6th annual digital forensic research workshop (DFRWS05)"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2004.1333918"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2004.1334415"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3142508"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.11.013"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2004.01.002"},{"key":"ref42","first-page":"1","volume-title":"Metadata demystified","author":"Brand","year":"2003"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.06.008"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2004.10.002"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2007.07.002"},{"key":"ref46","article-title":"An improved clock model for translating timestamps","volume-title":"JMU-INFOSEC-TR-2007\u2013001","author":"Buchholz","year":"2007"},{"key":"ref47","first-page":"S31","article-title":"A brief history of time","volume-title":"Proceedings of the 7th annual digital forensic research workshop (DFRWS07), Digital Investigation","author":"Buchholz"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.5013\/IJSSST.a.21.02.35"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2008.05.005"},{"issue":"4","key":"ref50","first-page":"1","article-title":"Defining digital forensic examination and analysis tools using abstraction layers","volume":"1","author":"Carrier","year":"2003","journal-title":"International Journal of Digital Evidence (IJDE)"},{"key":"ref51","volume-title":"File system forensic analysis","author":"Carrier","year":"2005"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2005.04.008"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2003.12.001"},{"issue":"2","key":"ref54","first-page":"1","article-title":"Getting physical with the digital investigation process","volume":"2","author":"Carrier","year":"2003","journal-title":"International Journal of Digital Evidence"}],"event":{"name":"2024 2nd International Conference on Cyber Resilience (ICCR)","location":"Dubai, United Arab Emirates","start":{"date-parts":[[2024,2,26]]},"end":{"date-parts":[[2024,2,28]]}},"container-title":["2024 2nd International Conference on Cyber Resilience (ICCR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10532252\/10532778\/10532850.pdf?arnumber=10532850","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,23]],"date-time":"2024-05-23T04:54:26Z","timestamp":1716440066000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10532850\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,26]]},"references-count":54,"URL":"https:\/\/doi.org\/10.1109\/iccr61006.2024.10532850","relation":{},"subject":[],"published":{"date-parts":[[2024,2,26]]}}}