{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:49:13Z","timestamp":1757544553870,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1109\/iciot48696.2020.9089494","type":"proceedings-article","created":{"date-parts":[[2020,5,12]],"date-time":"2020-05-12T00:36:49Z","timestamp":1589243809000},"page":"200-205","source":"Crossref","is-referenced-by-count":15,"title":["Proactive Forensics: Keystroke Logging from the Cloud as Potential Digital Evidence for Forensic Readiness Purposes"],"prefix":"10.1109","author":[{"given":"Sheunesu M.","family":"Makura","sequence":"first","affiliation":[]},{"given":"H. S.","family":"Venter","sequence":"additional","affiliation":[]},{"given":"Richard Adeyemi","family":"Ikuesan","sequence":"additional","affiliation":[]},{"given":"Victor R.","family":"Kebande","sequence":"additional","affiliation":[]},{"given":"Nickson M.","family":"Karie","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1080\/00450618.2016.1267797"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.18517\/ijaseit.8.1.2115"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1080\/20421338.2019.1585675"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1002\/wfs2.1350"},{"year":"0","author":"kebande","journal-title":"A Novel cloud Forensic Readiness Service Model","key":"ref10"},{"year":"2011","author":"casey","journal-title":"Digital evidence and computer crime Forensic science computers and the Internet","key":"ref11"},{"key":"ref12","article-title":"Digital Evidence, Digital Investigations and E-disclosure. A guide to Forensic Readiness for Organizations","author":"sommer","year":"2013","journal-title":"Security advisers and Lawyer"},{"key":"ref13","article-title":"Privacy: An Overview of the Electronic Communications Privacy Act","author":"doyle","year":"2011","journal-title":"Congressional Research Service Library of Congress"},{"year":"2012","journal-title":"Good Practice Guide for Digital Evidence","article-title":"ACPO","key":"ref14"},{"volume":"581","year":"2013","journal-title":"Personal Information Protection Act","key":"ref15"},{"year":"2010","journal-title":"The regulation of interception of communications and provision of communication-related information","key":"ref16"},{"key":"ref17","article-title":"The Electronic and Communications and Transact ions Act","author":"gereda","year":"2006","journal-title":"Telecommunications Law in South Africa"},{"key":"ref18","article-title":"Protections for electronic communications: The stored communications act and the Fourth Amendment","volume":"78","author":"scolnik","year":"2009","journal-title":"Fordham L Rev"},{"key":"ref19","first-page":"23","article-title":"A cloud forensic readiness model using a Botnet as a Service","author":"kebande","year":"0","journal-title":"The International Conference on Digital Security and Forensics (DigitalSec2014)"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1080\/00450618.2018.1551421"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/AINS.2017.8270436"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1007\/978-3-319-73697-6_5"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1080\/00450618.2016.1194473"},{"key":"ref6","first-page":"27","article-title":"A road map for digital forensic research","author":"palmer","year":"2001","journal-title":"First Digital Forensic Research Workshop"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/FiCloud.2016.57"},{"key":"ref5","article-title":"The NIST definition of cloud computing (draft)","volume":"800","author":"mell","year":"2011","journal-title":"NIST Special Publication"},{"key":"ref8","first-page":"1","article-title":"UML Modelling of Digital Forensic Process Models (DFPMs)","author":"k\u00f6hn","year":"2008","journal-title":"Issac"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.4018\/jdcf.2013010101"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1016\/j.diin.2011.05.016"},{"year":"2014","journal-title":"Information Technology-Security techniques-Assurance for digital evidence investigation process and committee draft","key":"ref9"},{"year":"2013","author":"richard","journal-title":"The Federal Bureau of Investigation(FBI)","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/CyberSec.2014.6913971"},{"key":"ref22","first-page":"399","article-title":"Requirements for achieving digital forensic readiness in the cloud environment using an NMB solution","author":"kebande","year":"2016","journal-title":"11th International Conference on Cyber Warfare and Security ICCWS"},{"key":"ref21","first-page":"307","article-title":"Not-a-Bot: Improving Service Availability in the Face of Botnet Attacks","volume":"9","author":"gummadi","year":"2009","journal-title":"NSDI"},{"key":"ref24","first-page":"151","article-title":"Towards a model for characterizing potential digital evidence in the cloud environment during digital forensic readiness process","author":"kebande","year":"0","journal-title":"ICCSM2015&#x2013;3rd International Conference on Cloud Security and Management ICCSM2015"},{"key":"ref23","first-page":"369","article-title":"Towards a prototype for achieving digital forensic readiness in the cloud using a distributed NMB solution","author":"kebande","year":"2016","journal-title":"13th European Conference on Cyber Warfare and Security"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1016\/j.diin.2019.07.003"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/TIFS.2017.2658539"}],"event":{"name":"2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT)","start":{"date-parts":[[2020,2,2]]},"location":"Doha, Qatar","end":{"date-parts":[[2020,2,5]]}},"container-title":["2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9081868\/9089428\/09089494.pdf?arnumber=9089494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:18:07Z","timestamp":1656375487000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9089494\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/iciot48696.2020.9089494","relation":{},"subject":[],"published":{"date-parts":[[2020,2]]}}}