{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T15:34:39Z","timestamp":1750865679392},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,30]]},"DOI":"10.1109\/iwcmc55113.2022.9825338","type":"proceedings-article","created":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T19:32:34Z","timestamp":1658259154000},"page":"1003-1008","source":"Crossref","is-referenced-by-count":1,"title":["Digital Forensic Investigation Framework for Marine Industry"],"prefix":"10.1109","author":[{"given":"Vihara","family":"Fernando","sequence":"first","affiliation":[{"name":"Sri Lanka Institute of Information Technology,Faculty of Graduate Studies and Research,Department of Computer Systems Engineering,Malabe,Sri Lanka"}]},{"given":"Amila","family":"Senarathne","sequence":"additional","affiliation":[{"name":"Sri Lanka Institute of Information Technology,Faculty of Graduate Studies and Research,Department of Computer Systems Engineering,Malabe,Sri Lanka"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ElConRus51938.2021.9396501"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA.2019.8899642"},{"journal-title":"Understanding & Using M-SCAT for Marine Incident Investigations","year":"0","key":"ref12"},{"journal-title":"Maritime incident investigation","year":"0","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICASERT.2019.8934707"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT.2015.180"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1111\/1556-4029.12823"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/AINS.2018.8631403"},{"key":"ref18","first-page":"46","author":"arnes","year":"2018","journal-title":"Digital Forensics"},{"journal-title":"Maritime critical infrastructure protection Dhs needs to enhance efforts to address port cybersecurity","year":"2015","author":"wilshusen","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA.2016.7503295"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1201\/9781420036930"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/OCEANS.2016.7761294"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IESTEC46403.2019.00068"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICETAS48360.2019.9117220"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2876151"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2012.33024"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.23919\/IRS.2017.8008149"},{"journal-title":"Study Hackers Attack Every 39 Seconds","year":"0","key":"ref1"},{"journal-title":"Systematic Cause Analysis Technique (SCAT) An Introduction","year":"2015","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA.2016.7503295"},{"key":"ref21","first-page":"55","article-title":"Guideline Model for Digital Forensic Investigation","author":"abdalla","year":"0","journal-title":"Proc Annual ADFSL Conf on Digital Forensics Security and Law"},{"key":"ref24","first-page":"55","article-title":"Teams Responsibilities for Digital Forensic Process","author":"abdalla","year":"0","journal-title":"Proc Annual ADFSL Conference on Digital Forensics Security and Law"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISMSC.2015.7594043"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/AEEICB.2016.7538328"}],"event":{"name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","start":{"date-parts":[[2022,5,30]]},"location":"Dubrovnik, Croatia","end":{"date-parts":[[2022,6,3]]}},"container-title":["2022 International Wireless Communications and Mobile Computing (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9823957\/9824097\/09825338.pdf?arnumber=9825338","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T20:00:32Z","timestamp":1659988832000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9825338\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/iwcmc55113.2022.9825338","relation":{},"subject":[],"published":{"date-parts":[[2022,5,30]]}}}