{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:03Z","timestamp":1750220883287,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,26]]},"DOI":"10.1145\/3339252.3340504","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"1-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["IoT Ignorance is Digital Forensics Research Bliss"],"prefix":"10.1145","author":[{"given":"Tina","family":"Wu","sequence":"first","affiliation":[{"name":"University of Oxford, Oxford, UK"}]},{"given":"Frank","family":"Breitinger","sequence":"additional","affiliation":[{"name":"University of New Haven, West Haven, Connecticut"}]},{"given":"Ibrahim","family":"Baggili","sequence":"additional","affiliation":[{"name":"University of New Haven, West Haven, Connecticut"}]}],"member":"320","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99277-8_3"},{"volume-title":"Digital Forensics and the Legal System: A Dilemma of our Times","year":"2008","author":"Ami-Narh James","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","unstructured":"IoT Analystics. 2018. What is Internet of Things Analytics (IoT Analytics)? - Definition from Techopedia. https:\/\/www.techopedia.com\/definition\/31460\/internet-of-things-analytics-iot-analytics  IoT Analystics. 2018. What is Internet of Things Analytics (IoT Analytics)? - Definition from Techopedia. https:\/\/www.techopedia.com\/definition\/31460\/internet-of-things-analytics-iot-analytics"},{"volume-title":"Welcome pwn: Almond smart home hub forensics. Digital Investigation 26 (jul","year":"2018","author":"Awasthi Akshay","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2011.09.005"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2017.06.010"},{"volume-title":"Internet of Things security and forensics: Challenges and opportunities. Future Generation Computer Systems 78 (jan","year":"2018","author":"Conti Mauro","key":"e_1_3_2_1_8_1"},{"volume-title":"Culture Media & Sport","year":"2017","author":"Department for Digital","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3232814"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2010.05.009"},{"key":"e_1_3_2_1_12_1","unstructured":"Gartner. 2017. Internet of Things Defined - Tech Definitions by Gartner. https:\/\/www.gartner.com\/it-glossary\/internet-of-things\/  Gartner. 2017. Internet of Things Defined - Tech Definitions by Gartner. https:\/\/www.gartner.com\/it-glossary\/internet-of-things\/"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2017.06.004"},{"volume-title":"Guide to Integrating Forensic Techniques into Incident Response | NIST. Special Publication (NIST SP) - 800-86 (sep","year":"2006","author":"Grance Timothy","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.10.007"},{"key":"e_1_3_2_1_16_1","unstructured":"Robert Hegarty David J. Lamb and Andrew Attwood. 2014. Digital Evidence Challenges in the Internet of Things. In INC.  Robert Hegarty David J. Lamb and Andrew Attwood. 2014. Digital Evidence Challenges in the Internet of Things. In INC."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2015.12"},{"volume-title":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud)","year":"2016","author":"Victor","key":"e_1_3_2_1_18_1"},{"volume-title":"Cloud Forensics An Overview. 7th IFIP Conference on Digital Forensics","year":"2011","author":"T.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3232813"},{"key":"e_1_3_2_1_21_1","unstructured":"Jimmy McCloskey. 2018. CSI Alexa: The smart home has become the new crime scene witness. https:\/\/www.the-ambient.com\/features\/smart-home-crime-scene-264  Jimmy McCloskey. 2018. CSI Alexa: The smart home has become the new crime scene witness. https:\/\/www.the-ambient.com\/features\/smart-home-crime-scene-264"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3104053"},{"key":"e_1_3_2_1_23_1","first-page":"2","article-title":"IoT-Forensics Meets Privacy","volume":"18","author":"Nieto Ana","year":"2018","journal-title":"Towards Cooperative Digital Investigations. Sensors"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2013.254159"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC.2013.71"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIPC.2015.7323000"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2015.03.002"},{"volume-title":"Regional Computer Forensics Laboratory Annual Report for Fiscal Year","year":"2014","author":"Forensics Laboratory Regional Computer","key":"e_1_3_2_1_29_1"},{"volume-title":"Regional Computer Forensics Laboratory Annual Report for Fiscal Year","year":"2015","author":"Forensics Laboratory Regional Computer","key":"e_1_3_2_1_30_1"},{"volume-title":"Regional Computer Forensics Laboratory Annual Report for Fiscal Year","year":"2016","author":"Forensics Laboratory Regional Computer","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236454.3236512"},{"volume-title":"Opening Pandora's Box: Effective Techniques for Reverse Engineering IoT Devices","author":"Shwartz Omer","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_34_1","unstructured":"Michelle Taylor. 2017. Murdered Woman\u00e2\u0102&Zacute;s Fitbit Log Used to Charge Husband. Website. https:\/\/www.forensicmag.com\/news\/2017\/04\/murdered-womans-fitbit-log-used-charge-husband  Michelle Taylor. 2017. Murdered Woman\u00e2\u0102&Zacute;s Fitbit Log Used to Charge Husband. Website. https:\/\/www.forensicmag.com\/news\/2017\/04\/murdered-womans-fitbit-log-used-charge-husband"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.162"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(15)30045-2"},{"key":"e_1_3_2_1_37_1","unstructured":"Wikipedia. 2018. Internet of things - Wikipedia. https:\/\/en.wikipedia.org\/wiki\/Internetofthings  Wikipedia. 2018. Internet of things - Wikipedia. https:\/\/en.wikipedia.org\/wiki\/Internetofthings"},{"key":"e_1_3_2_1_38_1","unstructured":"Zack Whittaker. 2018. California passes law that bans default passwords in connected devices. Website.  Zack Whittaker. 2018. California passes law that bans default passwords in connected devices. Website."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2015.46"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3104052"}],"event":{"name":"ARES '19: 14th International Conference on Availability, Reliability and Security","acronym":"ARES '19","location":"Canterbury CA United Kingdom"},"container-title":["Proceedings of the 14th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3340504","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3339252.3340504","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:17Z","timestamp":1750203857000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3340504"}},"subtitle":["A Survey to Understand IoT Forensics Definitions, Challenges and Future Research Directions"],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":38,"alternative-id":["10.1145\/3339252.3340504","10.1145\/3339252"],"URL":"https:\/\/doi.org\/10.1145\/3339252.3340504","relation":{},"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"2019-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}