{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T12:07:13Z","timestamp":1775736433663,"version":"3.50.1"},"reference-count":49,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1109\/icgs3.2019.8688020","type":"proceedings-article","created":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T02:09:15Z","timestamp":1555034955000},"page":"205-212","source":"Crossref","is-referenced-by-count":48,"title":["Next-Generation Digital Forensics: Challenges and Future Paradigms"],"prefix":"10.1109","author":[{"given":"Reza","family":"Montasari","sequence":"first","affiliation":[{"name":"Department of Computing and Engineering, The University of Huddersfield, Huddersfield, U.K"}]},{"given":"Richard","family":"Hill","sequence":"additional","affiliation":[{"name":"Department of Computing and Engineering, The University of Huddersfield, Huddersfield, U.K"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1368506.1368519"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.592"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2010.03.001"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2010.05.009"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.06.007"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04155-6_2"},{"key":"ref37","year":"0","journal-title":"Forensic Focus (2016) Current Challenges in Digital Forensics"},{"key":"ref36","first-page":"1","article-title":"Breaking the performance wall: The case for distributed digital forensics","volume":"94","author":"roussev","year":"2004","journal-title":"Proceedings of the Digital Forensics Research Workshop"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1113034.1113074"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1111\/j.1556-4029.2009.01150.x"},{"key":"ref28","first-page":"3","article-title":"Dealing with terabyte data sets in digital investigations","author":"beebe","year":"2005","journal-title":"IFIP Int Conf Digital Forensics"},{"key":"ref27","author":"quick","year":"2014","journal-title":"Data reduction and data mining framework for digital forensic evidence storage intelligence review and archive"},{"key":"ref29","first-page":"27","article-title":"A road map for digital forensic research","author":"palmer","year":"2001","journal-title":"First Digital Forensic Research Workshop"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.4251117"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-52491-7_11"},{"key":"ref20","first-page":"1","article-title":"IoT Forensics: Challenges for The IoA Era","author":"dermott","year":"2018","journal-title":"The 9th IEEE IFIP International Conference on New Technologies Mobility and Security (NTMS)"},{"key":"ref22","author":"bojanova","year":"0","journal-title":"' &#x2018;Securing the Internet of Anything (IoA)&#x2019;"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(11)70024-1"},{"key":"ref24","author":"callion","year":"0","journal-title":"' &#x2018;Parkinson's disease to be tracked by wearables'"},{"key":"ref23","author":"kobie","year":"0","journal-title":"' &#x2018;What is the internet of things?&#x2019;"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2014.09.002"},{"key":"ref25","year":"0","journal-title":"' &#x2018;ACPO Good Practice Guide ACPO Good Practice Guide for Digital Evidence'"},{"key":"ref10","author":"cameron","year":"0","journal-title":"' &#x2018;Future of Digital Forensics Faces Six Security Challenges in Fighting Borderless Cybercrime and Dark Web Tools'"},{"key":"ref11","author":"montasari","year":"2016","journal-title":"The Comprehensive Digital Forensic Investigation Process Model (CDFIPM) for Digital Forensic Practice"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/INTECH.2016.7845139"},{"key":"ref12","first-page":"69","article-title":"Formal Two Stage Triage Process Model (FTSTPM) for Digital Forensic Practice","volume":"10","author":"montasari","year":"2016","journal-title":"International Journal of Computer Science and Security (IJCSS)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2013.02.001"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s40012-012-0008-7"},{"key":"ref15","first-page":"303","author":"montasari","year":"2018","journal-title":"Testing the Comprehensive Digital Forensic Investigation Process Model (the CDFIPM) In Technology for Smart Futures"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2015.99"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/Innovations.2013.6544395"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07869-4_28"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.4018\/jdcf.2012040103"},{"key":"ref4","year":"0","journal-title":"Cybercrime and fraud scale revealed in annual figures"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2015.03.002"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2014.02.005"},{"key":"ref5","article-title":"Current challenges and future research areas for digital forensic investigation","author":"lillis","year":"2016"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICNIDC.2012.6418812"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2013.02.004"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2014.03.007"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24212-0_3"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2016911194"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2016.077444"},{"key":"ref48","article-title":"Finding and archiving the internet footprint","author":"garfinkel","year":"2009","journal-title":"Naval Postgraduate School Monterey CA"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2009.06.016"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1504\/IJICS.2017.085139"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2009.06.007"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23276-8_8"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2016.079430"}],"event":{"name":"2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3)","location":"London, UK","start":{"date-parts":[[2019,1,16]]},"end":{"date-parts":[[2019,1,18]]}},"container-title":["2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8672787\/8688013\/08688020.pdf?arnumber=8688020","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T18:40:14Z","timestamp":1753900814000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8688020\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/icgs3.2019.8688020","relation":{},"subject":[],"published":{"date-parts":[[2019,1]]}}}