{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T22:23:34Z","timestamp":1771626214282,"version":"3.50.1"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/itnac46935.2019.9078005","type":"proceedings-article","created":{"date-parts":[[2020,4,28]],"date-time":"2020-04-28T00:49:26Z","timestamp":1588034966000},"page":"1-6","source":"Crossref","is-referenced-by-count":10,"title":["Digital Forensic Readiness In Wireless Medical Systems"],"prefix":"10.1109","author":[{"given":"ArKar","family":"Kyaw","sequence":"first","affiliation":[]},{"given":"Brian","family":"Cusack","sequence":"additional","affiliation":[]},{"given":"Raymond","family":"Lutui","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2013.6699003"},{"key":"ref38","article-title":"A Forensic Framework for Handling Information Privacy Incidents","author":"reddy","year":"2010","journal-title":"IFIP Int Conf Digital Forensics"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-72367-9_2"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2010.5588281"},{"key":"ref31","article-title":"A Functional Architecture for Cloud Forensic Readiness Large-scale Potential Evidence Analysis","author":"kebande","year":"2015","journal-title":"14th European Conference on Cyber Warfare and Security (ECCWS)"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.4135\/9781412963909"},{"key":"ref37","article-title":"A conceptual framework to determine the digital forensic readiness of a Cloud Service Provider","author":"makutsoane","year":"2014","journal-title":"Portland International Conference on Management of Engineering and Technology (PICMET)"},{"key":"ref36","year":"0","journal-title":"Specialists in Organisational Forensic Readiness Planning and Implementation"},{"key":"ref35","first-page":"1","article-title":"Importance of Forensic Readiness","volume":"1","author":"sule","year":"2014","journal-title":"ISACA Journal"},{"key":"ref34","first-page":"1","article-title":"A Ten Step Process for Forensic Readiness","volume":"2","author":"rowlingson","year":"2004","journal-title":"International Journal of Digital Evidence"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018438"},{"key":"ref40","article-title":"Towards a prototype for Achieving Digital Forensic Readiness in the Cloud using a Distributed NMB Solution","author":"kebande","year":"2016","journal-title":"14th European Conference on Cyber Warfare and Security (ECCWS)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29734-2_16"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228364"},{"key":"ref13","author":"hermans","year":"0","journal-title":"Achieving digital forensic readiness"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud.2017.12"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.5"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2016.7813819"},{"key":"ref17","first-page":"1","article-title":"Reference architecture for a cloud forensic readiness system","author":"de marco","year":"2014","journal-title":"EAI Endorsed Transactions on Security and Safety"},{"key":"ref18","article-title":"A Cloud Forensic Readiness Model Using a Botnet as a Service","author":"kebande","year":"2014","journal-title":"The International Conference on Digital Security and Forensics (DigitalSec2014)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS.2017.7916508"},{"key":"ref28","author":"reggiani","year":"0","journal-title":"A brief introduction to Forensic Readiness"},{"key":"ref4","author":"napier","year":"0","journal-title":"NICS forensic readiness guidelines"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.06.004"},{"key":"ref3","author":"reggiani","year":"0","journal-title":"A brief introduction to Forensic Readiness"},{"key":"ref6","author":"ehlinger","year":"0","journal-title":"Former employee reportedly steals mental health data on 28 434 Bexar County patients"},{"key":"ref29","author":"kent","year":"2006","journal-title":"NIST Special Publication 800-86 Guide to integrating forensic techniques into incident response"},{"key":"ref5","author":"quinn","year":"0","journal-title":"Hospital pays $55 000 ransom no patient data stolen"},{"key":"ref8","author":"radcliffe","year":"0","journal-title":"Hacking Medical Devices for Fun and Insulin Breaking the Human Scada System"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.31"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2350"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-1674-6_8"},{"key":"ref1","author":"baldoni","year":"2016","journal-title":"Italian Cyber Security Report 2015 - A national framework"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.2.3.1-11"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"28","DOI":"10.5120\/ijca2016909193","article-title":"A mobile forensic readiness model aimed at minimising cyber bullying","volume":"140","author":"kebande","year":"2016","journal-title":"International Journal of Computer Applications"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISTAFRICA.2016.7530590"},{"key":"ref42","first-page":"173","article-title":"Digital Forensic Readiness: Are We There Yet?","volume":"9","author":"mouhtaropoulos","year":"2014","journal-title":"Journal of International Commercial Law and Technology"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15506-2_8"},{"key":"ref41","article-title":"Requirements for Achieving Digital Forensic Readiness in the Cloud Environment using an NMB Solution","author":"kebande","year":"2016","journal-title":"International Conference on Cyber Warfare and Security"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2010.5588281"},{"key":"ref26","article-title":"Forensic readiness for wireless medical systems","author":"cusack","year":"2012","journal-title":"Australian Digital Forensics Conference"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41148-9_4"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2014.6778944"}],"event":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","location":"Auckland, New Zealand","start":{"date-parts":[[2019,11,27]]},"end":{"date-parts":[[2019,11,29]]}},"container-title":["2019 29th International Telecommunication Networks and Applications Conference (ITNAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9068186\/9077926\/09078005.pdf?arnumber=9078005","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T15:16:17Z","timestamp":1658157377000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9078005\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/itnac46935.2019.9078005","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}