{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T12:19:14Z","timestamp":1742645954798,"version":"3.28.0"},"reference-count":66,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T00:00:00Z","timestamp":1691539200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T00:00:00Z","timestamp":1691539200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,9]]},"DOI":"10.1109\/icit58056.2023.10226145","type":"proceedings-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T17:26:12Z","timestamp":1693329972000},"page":"89-96","source":"Crossref","is-referenced-by-count":2,"title":["A Comprehensive Review of Digital Forensics Frameworks for Internet of Things (IoT) Devices"],"prefix":"10.1109","author":[{"given":"Yaman","family":"Salem","sequence":"first","affiliation":[{"name":"Arab American University,Department of Natural Engineering and Technology Sciences,Ramallah,Palestine,P600"}]},{"given":"Majdi","family":"Owda","sequence":"additional","affiliation":[{"name":"UNESCO Chair for Data Science Arab American University,Faculty of Data Science,Ramallah,Palestine,P600"}]},{"given":"Amani Yousef","family":"Owda","sequence":"additional","affiliation":[{"name":"Arab American University,Department of Natural Engineering and Technology Sciences,Ramallah,Palestine,P600"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102237"},{"volume-title":"Guide to Computer Forensics and Investigations","year":"2018","author":"Nelson","key":"ref2"},{"issue":"24","key":"ref3","first-page":"5867","article-title":"GDPR-BLOCKCHAIN COMPLIANCE for PERSONAL DATA: REVIEW PAPER","volume":"99","author":"Salem","year":"2021","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/icit52682.2021.9491639"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03405-4_14"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1504\/ijesdf.2023.10051774"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2019.2962586"},{"key":"ref8","first-page":"35","article-title":"Internet of Things Foresnsics: Challengaes and Case Study","volume-title":"IFIP International Conference on Digital Forensics","volume":"13","author":"Alabdulsalam","year":"2018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5772\/31929"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-86"},{"key":"ref11","first-page":"1","article-title":"An event-based digital forensic investigation framework","volume-title":"Digital forensic research workshop","author":"Carrier","year":"2004"},{"key":"ref12","article-title":"DTR-T001\u20130l Technical Report. A Road Map for Digital Forensic Research","volume-title":"Digital Forensics Workshop (DFRWS)","volume":"49","author":"Palmer","year":"2001"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.5121\/ijcsit.2011.3302"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39891-9_20"},{"key":"ref15","article-title":"Computer Forensics: an approach to evidence in cyberspace","volume-title":"Proceedings of the National Information Systems Security Conference","volume":"5","author":"Pollitt","year":"1995"},{"key":"ref16","first-page":"1","article-title":"An Examination of Digital Forensic Models","volume":"13","author":"G.","year":"2002","journal-title":"International Journal of Digital Evidence"},{"issue":"2","key":"ref17","first-page":"1","article-title":"Getting Physical with the Investigative Process","volume":"2","author":"Carrier","year":"2003","journal-title":"International Journal of Digital Evidence Fall"},{"volume-title":"The Enhanced Digital Investigation Process Model","year":"2004","author":"Baryamureeba","key":"ref18"},{"issue":"1","key":"ref19","first-page":"1","article-title":"An extended model of cybercrime investigations","volume":"3","author":"Ciardhu\u00e1in","year":"2004","journal-title":"International Journal of Digital Evidence"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2005.04.002"},{"issue":"1","key":"ref21","first-page":"1","article-title":"Case-Relevance Information Investigation: Binding Computer Intelligence to the Current Computer Forensic Framework","volume":"4","author":"Ruibin","year":"2005","journal-title":"International Journal"},{"issue":"2","key":"ref22","first-page":"1","article-title":"Computer Forensics Field Triage Process Model","volume":"1","author":"Rogers","year":"2006","journal-title":"Journal of Digital Forensics, Security and Law"},{"key":"ref23","first-page":"S33","article-title":"Framework for a Digital Forensic Investigation","volume":"64","author":"Kohn","year":"2006","journal-title":"Information and Computer Security Architectures Research Group (ICSA) Department of Computer Science, University of Pretoria"},{"issue":"2","key":"ref24","first-page":"143","article-title":"Computer Forensic Analysis in a Virtual Environment","volume":"6","author":"Derek","year":"2007","journal-title":"International journal of digital evidence 6.2"},{"issue":"2007","key":"ref25","first-page":"19","article-title":"A Common Process Model for Incident Response and Computer Forensics","volume-title":"Imf","volume":"7","author":"Freiling","year":"2007"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2010.02.003"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2011.021226"},{"issue":"1","key":"ref28","first-page":"118","article-title":"Systematic digital forensic investigation model","volume":"5","author":"Agarwal","year":"2011","journal-title":"International Journal of Computer Science and Security (IJCSS)"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.05.001"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.05.001"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.17781\/p002464"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/worldcis.2014.7028169"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.52922\/ti180697"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.009"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/icaibd49809.2020.9137498"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1767\/1\/012054"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.4236\/jcc.2015.35021"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/mc.2016.162"},{"article-title":"Internet of Things (IoT) - Gartner Glossary","volume-title":"Gartner","year":"2022","key":"ref39"},{"article-title":"Internet of Things (IoT) - NIST Definition","volume-title":"NIST","year":"2022","key":"ref40"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/i-smac.2017.8058363"},{"volume-title":"Practical Internet of Things SecuritySecond Edition","year":"2018","author":"Russell","key":"ref42"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/icitst.2015.7412116"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/prisms.2014.6970594"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/scc.2015.46"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2013.254159"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2017.06.010"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.04.014"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.01.012"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2021.301188"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3104053"},{"key":"ref52","first-page":"2","article-title":"IoTDots: A Digital Forensics Framework for Smart Environments","volume-title":"ArXiv preprint","volume":"13","author":"Babun","year":"2018"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ECAI.2018.8679017"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/trustcom\/bigdatase\/icess.2017.293"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3104052"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/icscee50312.2021.9498045"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/iciot.2018.00012"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3126715"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/smartiot.2018.00-19"},{"key":"ref60","first-page":"371","volume-title":"Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Internet of Things Using Resource-efficient Cryptographic Schemes","volume":"1\u2013371","author":"Hossain","year":"2018"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2906946"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/uic-atc.2013.71"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ficloud.2016.57"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.3390\/e21121141"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24133"},{"volume-title":"OpenHAB Controller","year":"2022","key":"ref66"}],"event":{"name":"2023 International Conference on Information Technology (ICIT)","start":{"date-parts":[[2023,8,9]]},"location":"Amman, Jordan","end":{"date-parts":[[2023,8,10]]}},"container-title":["2023 International Conference on Information Technology (ICIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10225686\/10225751\/10226145.pdf?arnumber=10226145","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T21:21:51Z","timestamp":1709328111000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10226145\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,9]]},"references-count":66,"URL":"https:\/\/doi.org\/10.1109\/icit58056.2023.10226145","relation":{},"subject":[],"published":{"date-parts":[[2023,8,9]]}}}